The default error handling view script generated using Zend_Tool
failed to escape request parameters when run in the "development" configuration environment, providing a potential XSS attack vector.
Zend_Tool_Project_Context_Zf_ViewScriptFile
was patched such that the view script template now calls theescape()
method on dumped request variables.
This particular vulnerability affects only those users who (a) are using Zend_Tool
(aka the zf
CLI) to generate their ErrorController
and view script, and (b) are running that code under the "development" configuration environment on a public-facing web server.
If you are running in any environment other than "development", the issue will not present.
There are three approaches you can take:
You should only ever run in the "development" environment when developing the application, and typically only behind a firewall. Additionally, you should set yourAPPLICATION_ENV
environment variable via your web server's virtual host configuration whenever possible. For public-facing hosts, set the value to anything other than "development".
If you must run under the "development" application environment on a publically accessible server, follow one of the next two recommendations.
Zend Framework 1.11.4 includes a patch that adds escaping to the generatederror/error.phtml
view script, ensuring that request variables are escaped appropriately for the browser.
Do note, however, that this will not update any previously generated code. You will still need to follow the next advice for previously generated error view scripts.
If you cannot upgrade, or if you want to patch previously generated error view scripts, do the following:
application/views/scripts/error/error.phtml
file from your ZF-generated project in a text editor or your IDE.
<pre><?php echo var_export($this->request->getParams(), true) ?>
var_export
call within a$this->escape()
method call: <pre><?php echo $this->escape(var_export($this->request->getParams(), true)) ?>
Once complete, save the file.
The Zend Framework team thanks the following for working with us to help protect its users:
If you have encountered a potential security vulnerability in Zend Framework, please report it to us atzf-security@zend.com. We will work with you to verify the vulnerability and patch it.
When reporting issues, please provide the following information:
We request that you contact us via the email address above and give the project contributors a chance to resolve the vulnerability and issue a new release prior to any public exposure; this helps protect Zend Framework users and provides them with a chance to upgrade and/or update in order to protect their applications.
For sensitive email communications, please use our PGP key.
Zend Framework takes security seriously. If we verify a reported security vulnerability, our policy is: