Vulnerability Details CVE-2014-2685
The GenericConsumer class in the Consumer component in ZendOpenId before 2.0.2 and the Zend_OpenId_Consumer class in Zend Framework 1 before 1.12.4 violate the OpenID 2.0 protocol by ensuring only that at least one field is signed, which allows remote attackers to bypass authentication by leveraging an assertion from an OpenID provider.
Exploit prediction scoring system (EPSS) score
EPSS Score 0.008
EPSS Ranking 73.6%
CVSS Severity
CVSS v2 Score 7.5
Products affected by CVE-2014-2685
-
cpe:2.3:a:zend:zend_framework:1.0.0
-
cpe:2.3:a:zend:zend_framework:1.0.1
-
cpe:2.3:a:zend:zend_framework:1.0.2
-
cpe:2.3:a:zend:zend_framework:1.0.3
-
cpe:2.3:a:zend:zend_framework:1.0.4
-
cpe:2.3:a:zend:zend_framework:1.10.0
-
cpe:2.3:a:zend:zend_framework:1.10.1
-
cpe:2.3:a:zend:zend_framework:1.10.2
-
cpe:2.3:a:zend:zend_framework:1.10.3
-
cpe:2.3:a:zend:zend_framework:1.10.4
-
cpe:2.3:a:zend:zend_framework:1.10.5
-
cpe:2.3:a:zend:zend_framework:1.10.6
-
cpe:2.3:a:zend:zend_framework:1.10.7
-
cpe:2.3:a:zend:zend_framework:1.10.8
-
cpe:2.3:a:zend:zend_framework:1.10.9
-
cpe:2.3:a:zend:zend_framework:1.11.0
-
cpe:2.3:a:zend:zend_framework:1.11.1
-
cpe:2.3:a:zend:zend_framework:1.11.10
-
cpe:2.3:a:zend:zend_framework:1.11.11
-
cpe:2.3:a:zend:zend_framework:1.11.12
-
cpe:2.3:a:zend:zend_framework:1.11.13
-
cpe:2.3:a:zend:zend_framework:1.11.15
-
cpe:2.3:a:zend:zend_framework:1.11.2
-
cpe:2.3:a:zend:zend_framework:1.11.3
-
cpe:2.3:a:zend:zend_framework:1.11.4
-
cpe:2.3:a:zend:zend_framework:1.11.5
-
cpe:2.3:a:zend:zend_framework:1.11.6
-
cpe:2.3:a:zend:zend_framework:1.11.7
-
cpe:2.3:a:zend:zend_framework:1.11.8
-
cpe:2.3:a:zend:zend_framework:1.11.9
-
cpe:2.3:a:zend:zend_framework:1.12.0
-
cpe:2.3:a:zend:zend_framework:1.12.1
-
cpe:2.3:a:zend:zend_framework:1.12.2
-
cpe:2.3:a:zend:zend_framework:1.12.3
-
cpe:2.3:a:zend:zend_framework:1.5.0
-
cpe:2.3:a:zend:zend_framework:1.5.1
-
cpe:2.3:a:zend:zend_framework:1.5.2
-
cpe:2.3:a:zend:zend_framework:1.5.3
-
cpe:2.3:a:zend:zend_framework:1.6.0
-
cpe:2.3:a:zend:zend_framework:1.6.1
-
cpe:2.3:a:zend:zend_framework:1.6.2
-
cpe:2.3:a:zend:zend_framework:1.7.0
-
cpe:2.3:a:zend:zend_framework:1.7.1
-
cpe:2.3:a:zend:zend_framework:1.7.2
-
cpe:2.3:a:zend:zend_framework:1.7.3
-
cpe:2.3:a:zend:zend_framework:1.7.4
-
cpe:2.3:a:zend:zend_framework:1.7.5
-
cpe:2.3:a:zend:zend_framework:1.7.6
-
cpe:2.3:a:zend:zend_framework:1.7.7
-
cpe:2.3:a:zend:zend_framework:1.7.8
-
cpe:2.3:a:zend:zend_framework:1.7.9
-
cpe:2.3:a:zend:zend_framework:1.8.0
-
cpe:2.3:a:zend:zend_framework:1.8.1
-
cpe:2.3:a:zend:zend_framework:1.8.2
-
cpe:2.3:a:zend:zend_framework:1.8.3
-
cpe:2.3:a:zend:zend_framework:1.8.4
-
cpe:2.3:a:zend:zend_framework:1.8.5
-
cpe:2.3:a:zend:zend_framework:1.9.0
-
cpe:2.3:a:zend:zend_framework:1.9.1
-
cpe:2.3:a:zend:zend_framework:1.9.2
-
cpe:2.3:a:zend:zend_framework:1.9.3
-
cpe:2.3:a:zend:zend_framework:1.9.4
-
cpe:2.3:a:zend:zend_framework:1.9.5
-
cpe:2.3:a:zend:zend_framework:1.9.6
-
cpe:2.3:a:zend:zend_framework:1.9.7
-
cpe:2.3:a:zend:zend_framework:1.9.8
-
cpe:2.3:a:zend:zendopenid:2.0.1