Vulnerability DatabaseGHSA-g43w-98wp-m694

GHSA-g43w-98wp-m694
PHP vulnerability analysis and mitigation

Overview

A low-level vulnerability (GHSA-g43w-98wp-m694) was identified in the SilverStripe framework, known as the XML Quadratic Blowup Attack. The vulnerability was discovered in August 2014 and affected SilverStripe framework versions 3.1.0 through 3.1.11. The issue was patched in version 3.1.12, released on March 20, 2015 (SilverStripe Advisory).

Technical details

The vulnerability has been assigned a CVSS v3.1 score of 5.3 (Moderate severity) with the following vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L. The issue is classified under CWE-400 and CWE-776, relating to uncontrolled resource consumption and XML entity expansion. The vulnerability could be exploited through XML processing without proper entity expansion controls (GitHub Advisory).

Impact

The vulnerability could potentially be exploited to affect the performance of a site through XML entity expansion, leading to a denial of service condition. The attack specifically targets the availability of the system, with no direct impact on confidentiality or integrity (GitHub Advisory).

Mitigation and workarounds

The vulnerability was fixed in SilverStripe framework version 3.1.12. The fix includes implementation of XML entity expansion controls and doctype validation options in the XML processing functionality (Framework Commit).

Additional resources


SourceThis report was generated using AI

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

“Best User Experience I have ever seen, provides full visibility to cloud workloads.”
David EstlickCISO
“Wiz provides a single pane of glass to see what is going on in our cloud environments.”
Adam FletcherChief Security Officer
“We know that if Wiz identifies something as critical, it actually is.”
Greg PoniatowskiHead of Threat and Vulnerability Management