Ecosyste.ms: Advisories

An open API service providing security vulnerability metadata for many open source software ecosystems.

Security Advisories: MDE2OlNlY3VyaXR5QWR2aXNvcnlHSFNBLXEzNDgtZjkzeC05Z3g0

Lack of Input Validation in zendesk_api_client_php for Zendesk Subdomain

Impact

Lack of input validation of the Zendesk subdomain could expose users of the library to Server Side Request Forgery (SSRF).

Resolution

Validate the provided Zendesk subdomain to be a valid subdomain in:

Permalink: https://github.com/advisories/GHSA-q348-f93x-9gx4
JSON: https://advisories.ecosyste.ms/api/v1/advisories/MDE2OlNlY3VyaXR5QWR2aXNvcnlHSFNBLXEzNDgtZjkzeC05Z3g0
Source: GitHub Advisory Database
Origin: Unspecified
Severity: Critical
Classification: General
Published: over 3 years ago
Updated: almost 2 years ago


Identifiers: GHSA-q348-f93x-9gx4, CVE-2021-30492
References: Repository: https://github.com/zendesk/zendesk_api_client_php
Blast Radius: 0.0

Affected Packages

packagist:zendesk/zendesk_api_client_php
Dependent packages: 18
Dependent repositories: 75
Downloads: 17,837,961 total
Affected Version Ranges: < 2.2.11
Fixed in: 2.2.11
All affected versions: 1.0.0, 1.1.0, 1.1.1, 1.1.2, 1.2.0, 1.2.1, 2.0.3, 2.0.4, 2.0.5, 2.0.6, 2.0.7, 2.0.8, 2.0.9, 2.1.0, 2.1.1, 2.1.2, 2.1.3, 2.1.4, 2.1.5, 2.1.6, 2.1.7, 2.1.8, 2.1.9, 2.1.10, 2.1.11, 2.2.0, 2.2.1, 2.2.2, 2.2.3, 2.2.4, 2.2.5, 2.2.6, 2.2.7, 2.2.8, 2.2.9, 2.2.10
All unaffected versions: 2.2.11, 2.2.12, 2.2.13, 2.2.14, 2.2.15, 2.2.16, 2.2.17, 3.0.0, 3.0.1, 3.1.0