Zend Framework vulnerable to SQL injection


Zend Framework is an open source web application framework. Zend Framework contains an SQL injection vulnerability (CWE-89) due to the argument of the ORDER BY clause.

Hiroshi Tokumaru of HASH Consulting Corporation reported this vulnerability to IPA.
JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership.
CVSS Severity (What is CVSS?)

Base Metrics: 6.8 (Medium) [IPA Score]
  • Access Vector: Network
  • Access Complexity: Medium
  • Authentication: None
  • Confidentiality Impact: Partial
  • Integrity Impact: Partial
  • Availability Impact: Partial

CVSS V3 Severity:
Base Metrics: 5.6 (Medium) [IPA Score]
  • Access Vector: Network
  • Attack Complexity: High
  • Privileges Required: None
  • User Interaction: None
  • Scope: Unchanged
  • Confidentiality Impact: Low
  • Integrity Impact: Low
  • Availability Impact: Low
Affected Products

Zend Technologies Ltd.
  • Zend Framework 1.12.7 and earlier


An attacker who can access the product may execute SQL commands.

[Update the Software]
Update to the latest version according to the information provided by the developer.
This vulnerability has been addressed on 26 August, 2014.
Vendor Information

Zend Technologies Ltd.
CWE (What is CWE?)

  1. SQL Injection(CWE-89) [IPA Evaluation]
CVE (What is CVE?)

  1. CVE-2014-4914

  1. JVN : JVN#71730320
Revision History

  Web page was published