@@ -7,11 +7,11 @@ Master: [ Zend_Locale:
17
17
[ CLDR] ( http://cldr.unicode.org ) updated to version 25
@@ -20,198 +20,21 @@ IMPORTANT FIXES FOR 1.12.8dev
20
20
- [ #375 ] ( https://github.com/zendframework/zf1/pull/375 ) Implement
21
21
Zend_Pdf::setJavascript(), Zend_Pdf::addJavascript() and
22
22
Zend_Pdf::resetJavaScript()
23
-
24
- SECURITY FIXES FOR 1.12.7
25
- -------------------------
26
-
27
- - ** ZF2014-04:** Potential SQL Injection (SQLi) attack via ORDER expessions:
28
- ` Zend\Db\Select ` 's ` order() ` method allwed passing function calls, but
29
- did not provide checks to prevent SQLi vectors. As an example:
30
-
31
- ``` php
32
- $select = $db->select()->order('MD5(1); select...');
33
- ```
34
-
35
- could be entered.
36
-
37
- If you use ` Zend\Db\Select ` with ORDER clauses, we strongly urge that you
38
- upgrade immediately.
39
-
40
- IMPORTANT FIXES FOR 1.12.7
41
- --------------------------
42
-
43
- - [ #331 ] ( https://github.com/zendframework/zf1/pull/331 ) and
44
- [ #376 ] ( https://github.com/zendframework/zf1/pull/376 ) provide support
45
- for PHPUnit 4 and 4.1, respectively, both within the Zend Framework test suite
46
- and inside the ` Zend_Test_PHPUnit ` component.
47
- - [ #333 ] ( https://github.com/zendframework/zf1/pull/333 ) backports recursive
48
- page removal within ` Zend_Navigation ` from Zend Framework 2.
49
- - [ #343 ] ( https://github.com/zendframework/zf1/pull/343 ) updates the ` Hostname `
50
- validator to support the new IANA top level domains.
51
- - Forward-compatibility changes were made to ensure Zend Framework 1 will run on
52
- the upcoming PHP 5.6.
53
-
54
-
55
- IMPORTANT FIXES FOR 1.12.6
56
- --------------------------
57
-
58
- - [ #307 ] ( https://github.com/zendframework/zf1/pull/307 ) fixes a backwards
59
- compatibility break in the ` Zend_Locale ` component. 1.12.4 updated the
60
- [ CLDR] ( http://cldr.unicode.org ) version used by Zend Framework 1, which
61
- resulted in the removal of several locales we previously supported. The patch
62
- in #307 adds locale aliases for these to the new locales supported in recent
63
- versions of the CLDR, ensuring backwards compatibility for ZF1 users.
64
-
65
- SECURITY FIXES FOR 1.12.4
66
- -------------------------
67
-
68
- - ** ZF2014-01:** Potential XXE/XEE attacks using PHP functions:
69
- ` simplexml_load_* ` , ` DOMDocument::loadXML ` , and ` xml_parse ` . A new component,
70
- ` Zend_Xml ` , was introduced to mitigate XML eXternal Entity and XML Entity
71
- Expansion vectors that are present in older versions of libxml2 and/or PHP.
72
- Components that could contain these vectors include:
73
-
74
- - ` Zend_Amf `
75
- - ` Zend_Config `
76
- - ` Zend_Dom `
77
- - ` Zend_Feed `
78
- - ` Zend_Gdata `
79
- - ` Zend_Json `
80
- - ` Zend_Locale `
81
- - ` Zend_Mobile_Push `
82
- - ` Zend_Rest_Client `
83
- - ` Zend_Search_Lucene `
84
- - ` Zend_Serializer_Adapter_Wddx `
85
- - ` Zend_Service_Amazon `
86
- - ` Zend_Service_AudioScrobbler `
87
- - ` Zend_Service_Delicious `
88
- - ` Zend_Service_Ebay `
89
- - ` Zend_Service_Flickr `
90
- - ` Zend_Service_SlideShare `
91
- - ` Zend_Service_SqlAzure `
92
- - ` Zend_Service_Technorati `
93
- - ` Zend_Service_WindowsAzure `
94
- - ` Zend_Service_Yahoo `
95
- - ` Zend_Soap `
96
- - ` Zend_Translate `
97
-
98
- If you use one or more of these components, we strongly urge that you upgrade
99
- immediately.
100
-
101
- - ** ZF2014-02:** Potential security issue in login mechanism of ` Zend_OpenId `
102
- consumer. Using the Consumer component in conjunction with a malicious OpenID
103
- provider, one could login to a service using an arbitrary OpenID Identity
104
- without requiring credentials, allowing impersonation of an OpenID Identity.
105
- If you use this component, we strongly urge that you upgrade immediately.
106
-
107
- IMPORTANT FIXES FOR 1.12.4
108
- --------------------------
109
-
110
-
111
- - [ #221 ] ( https://github.com/zendframework/zf1/pull/221 ) removes the TinySrc view
112
- helper, as the TinySrc service no longer exists.
113
- - [ #222 ] ( https://github.com/zendframework/zf1/pull/222 ) removes the InfoCard
114
- component, as the CardSpace service no longer exists.
115
- - [ #271 ] ( https://github.com/zendframework/zf1/pull/271 ) removes the Nirvanix
116
- component, as the Nirvanix service shut down in October 2013.
117
-
118
- IMPORTANT FIXES FOR 1.12.3
119
- --------------------------
120
-
121
- This release incorporates is primarily aimed to update
122
- Zend_Service_Twitter to the Twitter v1.1 API:
123
-
124
- - http://framework.zend.com/issues/browse/ZF-12530
125
-
126
- Because the Twitter v1.1 API is not backwards compatible with v1.0, the
127
- API for Zend_Service_Twitter has been changed; if you have been using it
128
- previously, you will need to update your code accordingly. Both the
129
- end-user and API documentation have been updated to reflect the changes.
130
-
131
- IMPORTANT FIXES FOR 1.12.2
132
- --------------------------
133
-
134
- This release incorporates over 40 bugfixes. In particular, the following
135
- issue has been resolved in Zend_Service_Twitter:
136
-
137
- - http://framework.zend.com/issues/browse/ZF-9253
138
-
139
- This fix ensures that Zend_Service_Twitter uses the new versioned API
140
- endpoint required by Twitter.
141
-
142
- SECURITY FIXES FOR 1.12.1
143
- -------------------------
144
-
145
- This release incorporates fixes for:
146
-
147
- - http://framework.zend.com/security/advisory/ZF2012-05
148
-
149
- Zend_Feed_Rss and Zend_Feed_Atom were found to contain XML eXternal
150
- Entity (XXE) Injection vectors due to insecure usage of the DOM
151
- extension. External entities could be specified by adding a specific
152
- DOCTYPE element to XML-RPC requests; exploiting this vulnerability could
153
- coerce opening arbitrary files and/or TCP connections.
154
-
155
- A similar issue was fixed for 1.12.0, in the Zend_Feed::import() method;
156
- however, the reporter of the issue discovered that the individual
157
- classes contained similar functionality in their constructors which
158
- remained vulnerable.
159
-
160
- The patch applied removes the XXE vector by calling
161
- libxml_disable_entity_loader() before attempting to parse the feed via
162
- DOMDocument::loadXML().
163
-
164
- The above patches are also available in the 1.11 series of releases.
165
-
166
- Thanks goes to Yury Dyachenko at Positive Research Center for for
167
- reporting the XXE vulnerability and reviewing the patches created to fix
168
- the issue.
169
-
170
- SECURITY FIXES FOR 1.12.0
171
- -------------------------
172
-
173
- This release incorporates fixes for each of:
174
-
175
- - http://framework.zend.com/security/advisory/ZF2012-01
176
- - http://framework.zend.com/security/advisory/ZF2012-02
177
-
178
- Several components were found to be vulnerable to XML eXternal Entity
179
- (XXE) Injection attacks due to insecure usage of the SimpleXMLElement
180
- class (SimpleXML PHP extension). External entities could be specified
181
- by adding a specific DOCTYPE element to XML-RPC requests; exploiting
182
- this vulnerability could coerce opening arbitrary files and/or TCP
183
- connections.
184
-
185
- Additionally, these same components were found to be vulnerable to XML
186
- Entity Expansion (XEE) vectors. XEE attacks define custom entities
187
- within the DOCTYPE that refer to themselves, leading to recursion; the
188
- end result is excessive consumption of CPU and RAM, making Denial of
189
- Service (DoS) attacks easier to implement.
190
-
191
- Vulnerable components included:
192
-
193
- - Zend_Dom
194
- - Zend_Feed
195
- - Zend_Soap
196
- - Zend_XmlRpc
197
-
198
- The patches applied do the following:
199
-
200
- - To remove XXE vectors, libxml_disable_entity_loader() is called
201
- before any SimpleXML calls are executed.
202
-
203
- - To remove XEE vectors, we loop through the DOMDocument child nodes,
204
- ensuring none are of type XML_DOCUMENT_TYPE_NODE, and raising an
205
- exception if any are. If SimpleXML is used, a DOMDocument is created
206
- first, processed as above, and then passed to simplexml_import_dom.
207
-
208
- The above patches are also available in the 1.11 series of releases.
209
-
210
- Thanks goes to Johannes Greil and Kestutis Gudinavicius of SEC-Consult
211
- for reporting the original XXE vulnerability against Zend_XmlRpc and
212
- working with us to provide a working solution. Thanks goes to Pádraic
213
- Brady for helping us identify other XXE vectors, as well as identifying
214
- and patching the XEE vectors.
23
+ - [ #414 ] ( https://github.com/zendframework/zf1/pull/414 ) Adds the
24
+ ` Microsoft_Console ` component from the Windows Azure SDK for PHP into
25
+ the ` Zend_Service_Console ` component, ensuring that WindowsAzure
26
+ command line functionality included in the framework can now work.
27
+ - [ #385 ] ( https://github.com/zendframework/zf1/pull/385 ) Adds support for
28
+ DateTime fractional seconds under PHP 5.6+.
29
+ - [ #382 ] ( https://github.com/zendframework/zf1/pull/382 ) Ensures that
30
+ orphaned metadata cache files are removed when ` Zend_Cache::CLEANING_MODE_ALL `
31
+ is used.
32
+ - [ #410 ] ( https://github.com/zendframework/zf1/pull/410 ) Ensures that calls
33
+ to reset the status of the libxml entity loader happen as soon as possible,
34
+ to prevent potential threading issues under php-fpm (since the settings
35
+ are per process, not per-request, in that environment).
36
+
37
+ See http://framework.zend.com/changelog/1.12.8 for full details.
215
38
216
39
NEW FEATURES
217
40
============
0 commit comments