Vulnerability CVE-2021-32796


Published: 2021-07-27   Modified: 2021-07-28

Description:
xmldom is an open source pure JavaScript W3C standard-based (XML DOM Level 2 Core) DOMParser and XMLSerializer module. xmldom versions 0.6.0 and older do not correctly escape special characters when serializing elements removed from their ancestor. This may lead to unexpected syntactic changes during XML processing in some downstream applications. This issue has been resolved in version 0.7.0. As a workaround downstream applications can validate the input and reject the maliciously crafted documents.

Type:

CWE-116

(Improper Encoding or Escaping of Output)

CVSS2 => (AV:N/AC:L/Au:N/C:N/I:P/A:N)

CVSS Base Score
Impact Subscore
Exploitability Subscore
5/10
2.9/10
10/10
Exploit range
Attack complexity
Authentication
Remote
Low
No required
Confidentiality impact
Integrity impact
Availability impact
None
Partial
None
Affected software
Xmldom project -> Xmldom 

 References:
https://mattermost.com/blog/coordinated-disclosure-go-xml-vulnerabilities/
https://github.com/xmldom/xmldom/security/advisories/GHSA-5fg8-2547-mr8q
https://github.com/xmldom/xmldom/commit/7b4b743917a892d407356e055b296dcd6d107e8b

Copyright 2024, cxsecurity.com

 

Back to Top