First published: Thu May 07 2015(Updated: )
CRLF injection vulnerability in Zend\Mail (Zend_Mail) in Zend Framework before 1.12.12, 2.x before 2.3.8, and 2.4.x before 2.4.1 allows remote attackers to inject arbitrary HTTP headers and conduct HTTP response splitting attacks via CRLF sequences in the header of an email.
Credit: secalert@redhat.com secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
composer/zendframework/zend-http | >=2.0.0<2.0.99>=2.1.0<2.1.99>=2.3.0<2.3.8>=2.4.0<2.4.1 | |
composer/zendframework/zendframework1 | >=1.12.0<1.12.12 | |
composer/zendframework/zend-mail | >=2.0.0<2.0.99>=2.1.0<2.1.99>=2.3.0<2.3.8>=2.4.0<2.4.1 | |
composer/zendframework/zendframework | >=2.0.0<2.0.99>=2.1.0<2.1.99>=2.3.0<2.3.8>=2.4.0<2.4.1 | |
Zend Zend Framework | <1.12.12 | |
Zend Zend Framework | >=2.3.0<2.3.8 | |
Zend Zend Framework | >=2.4.0<2.4.1 | |
debian/zendframework | ||
composer/zendframework/zend-http | <1.12.12 | 1.12.12 |
composer/zendframework/zendframework1 | <1.12.12 | 1.12.12 |
composer/zendframework/zend-http | >=2.4.0rc1<2.4.1 | 2.4.1 |
composer/zendframework/zend-http | >=2.0.0beta4<2.3.8 | 2.3.8 |
composer/zendframework/zendframework | >=2.4.0rc1<2.4.1 | 2.4.1 |
composer/zendframework/zendframework | >=2.0.0beta4<2.3.8 | 2.3.8 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID of this security vulnerability is CVE-2015-3154.
The severity of CVE-2015-3154 is medium with a CVSS score of 6.1.
The affected software for CVE-2015-3154 includes Zend Framework versions before 1.12.12, 2.x before 2.3.8, and 2.4.x before 2.4.1, as well as Zend Mail versions before 2.0.99, 2.1.99, 2.3.8, and 2.4.1.
CVE-2015-3154 is a CRLF injection vulnerability that allows remote attackers to inject arbitrary HTTP headers and conduct HTTP response splitting attacks via CRLF sequences in the header of an email.
To fix CVE-2015-3154, update Zend Framework to version 1.12.12 or later, or update Zend Mail to version 2.0.99, 2.1.99, 2.3.8, or 2.4.1.