First published: Mon Aug 12 2013(Updated: )
Auth/Yadis/XML.php in PHP OpenID Library 2.2.2 and earlier allows remote attackers to read arbitrary files, send HTTP requests to intranet servers, or cause a denial of service (CPU and memory consumption) via XRDS data containing an external entity declaration in conjunction with an entity reference, related to an XML External Entity (XXE) issue.
Credit: vultures@jpcert.or.jp vultures@jpcert.or.jp
Affected Software | Affected Version | How to fix |
---|---|---|
composer/openid/php-openid | <2.3.0 | |
composer/typo3/cms | >=6.2.0<6.2.6 | |
composer/typo3/cms | >=6.2.0<6.2.6 | 6.2.6 |
composer/openid/php-openid | <2.3.0 | 2.3.0 |
Janrain PHP-OpenID | <=2.2.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2013-4701 has been categorized as a high severity vulnerability due to its ability to allow remote file reading, HTTP requests to intranet servers, and potential denial of service.
To fix CVE-2013-4701, upgrade to PHP OpenID Library version 2.3.0 or TYPO3 CMS version 6.2.6 or later.
CVE-2013-4701 impacts versions of PHP OpenID Library up to 2.2.2 and TYPO3 CMS versions from 6.2.0 to 6.2.6.
CVE-2013-4701 can facilitate attacks that lead to unauthorized file access, internal network scanning, and denial of service through resource exhaustion.
Exploiting CVE-2013-4701 can be straightforward for an attacker with remote access due to its reliance on external entity declarations in XML.