Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2020-29510

Опубликовано: 14 дек. 2020
Источник: debian

Описание

The encoding/xml package in Go versions 1.15 and earlier does not correctly preserve the semantics of directives during tokenization round-trips, which allows an attacker to craft inputs that behave in conflicting ways during different stages of processing in affected downstream applications.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
golang-1.15unfixedpackage
golang-1.11removedpackage
golang-1.8removedpackage
golang-1.8ignoredstretchpackage
golang-1.7removedpackage
golang-1.7ignoredstretchpackage

Примечания

  • https://github.com/golang/go/issues/43168

  • https://mattermost.com/blog/coordinated-disclosure-go-xml-vulnerabilities/

  • Upstream considers this WONTFIX and requires validation/updates in potentially affected SAML libs

Связанные уязвимости

CVSS3: 9.8
ubuntu
около 5 лет назад

The encoding/xml package in Go versions 1.15 and earlier does not correctly preserve the semantics of directives during tokenization round-trips, which allows an attacker to craft inputs that behave in conflicting ways during different stages of processing in affected downstream applications.

CVSS3: 5.6
redhat
около 5 лет назад

The encoding/xml package in Go versions 1.15 and earlier does not correctly preserve the semantics of directives during tokenization round-trips, which allows an attacker to craft inputs that behave in conflicting ways during different stages of processing in affected downstream applications.

CVSS3: 9.8
nvd
около 5 лет назад

The encoding/xml package in Go versions 1.15 and earlier does not correctly preserve the semantics of directives during tokenization round-trips, which allows an attacker to craft inputs that behave in conflicting ways during different stages of processing in affected downstream applications.

github
больше 3 лет назад

The encoding/xml package in Go versions 1.15 and earlier does not correctly preserve the semantics of directives during tokenization round-trips, which allows an attacker to craft inputs that behave in conflicting ways during different stages of processing in affected downstream applications.