Fixes a bug in Zend Framework's Stream HTTP Wrapper
Critical severity
GitHub Reviewed
Published
Apr 20, 2021
in
OpenMage/magento-lts
•
Updated Feb 1, 2023
Package
Affected versions
<= 19.4.12
>= 20.0.0, <= 20.0.8
Patched versions
19.4.13
20.0.9
Description
Reviewed
Apr 21, 2021
Published by the National Vulnerability Database
Apr 21, 2021
Published to the GitHub Advisory Database
Apr 22, 2021
Last updated
Feb 1, 2023
Impact
CVE-2021-3007: Backport of Zend_Http_Response_Stream, added certain type checking as a way to prevent exploitation. https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3007
This vulnerability is caused by the unsecured deserialization of an object. In versions higher than Zend Framework 3.0.0, the attacker abuses the Zend3 feature that loads classes from objects in order to upload and execute malicious code in the server. The code can be uploaded using the “callback” parameter, which in this case inserts a malicious code instead of the “callbackOptions” array.
Patches
Has the problem been patched? What versions should users upgrade to?
v20.0.9 v19.4.13
References