Description
xmldom is a pure JavaScript W3C standard-based (XML DOM Level 2 Core) DOMParser and XMLSerializer module. xmldom versions 0.4.0 and older do not correctly preserve system identifiers, FPIs or namespaces when repeatedly parsing and serializing maliciously crafted documents. This may lead to unexpected syntactic changes during XML processing in some downstream applications. This is fixed in version 0.5.0. As a workaround downstream applications can validate the input and reject the maliciously crafted documents.
Analysis and contextual insights are available on OpenCVE Cloud.
Remediation
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
Debian DLA |
DLA-3260-1 | node-xmldom security update |
EUVD |
EUVD-2021-0663 | xmldom is a pure JavaScript W3C standard-based (XML DOM Level 2 Core) DOMParser and XMLSerializer module. xmldom versions 0.4.0 and older do not correctly preserve system identifiers, FPIs or namespaces when repeatedly parsing and serializing maliciously crafted documents. This may lead to unexpected syntactic changes during XML processing in some downstream applications. This is fixed in version 0.5.0. As a workaround downstream applications can validate the input and reject the maliciously crafted documents. |
Github GHSA |
GHSA-h6q6-9hqw-rwfv | Misinterpretation of malicious XML input |
Ubuntu USN |
USN-6102-1 | xmldom vulnerabilities |
References
History
No history.
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2024-08-03T18:09:16.000Z
Reserved: 2020-12-22T00:00:00.000Z
Link: CVE-2021-21366
No data.
Status : Modified
Published: 2021-03-12T17:15:12.643
Modified: 2024-11-21T05:48:12.493
Link: CVE-2021-21366
OpenCVE Enrichment
No data.
Debian DLA
EUVD
Github GHSA
Ubuntu USN