{"vulnerability": "CVE-2012-3363", "sightings": [{"uuid": "71af24a9-2282-49d2-91cb-37c524dfc1a8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2012-3363", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/2037", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2012-3363\n\ud83d\udd39 Description: Zend_XmlRpc in Zend Framework 1.x before 1.11.12 and 1.12.x before 1.12.0 does not properly handle SimpleXMLElement classes, which allows remote attackers to read arbitrary files or create TCP connections via an external entity reference in a DOCTYPE element in an XML-RPC request, aka an XML external entity (XXE) injection attack.\n\ud83d\udccf Published: 2013-02-13T17:00:00\n\ud83d\udccf Modified: 2025-01-16T20:38:41.614Z\n\ud83d\udd17 References:\n1. https://moodle.org/mod/forum/discuss.php?d=225345\n2. http://lists.fedoraproject.org/pipermail/package-announce/2013-April/101358.html\n3. http://www.openwall.com/lists/oss-security/2012/06/27/2\n4. http://git.moodle.org/gw?p=moodle.git&amp;a=search&amp;h=HEAD&amp;st=commit&amp;s=MDL-34284\n5. http://www.debian.org/security/2012/dsa-2505\n6. http://www.openwall.com/lists/oss-security/2012/06/26/4\n7. http://lists.fedoraproject.org/pipermail/package-announce/2013-April/101310.html\n8. http://www.openwall.com/lists/oss-security/2012/06/26/2\n9. http://openwall.com/lists/oss-security/2013/03/25/2\n10. http://www.securitytracker.com/id?1027208\n11. http://framework.zend.com/security/advisory/ZF2012-01\n12. https://www.sec-consult.com/files/20120626-0_zend_framework_xxe_injection.txt", "creation_timestamp": "2025-01-16T20:55:52.000000Z"}]}