- Description
- It was discovered that the XML::Atom Perl module before version 0.39 did not disable external entities when parsing XML from potentially untrusted sources. This may allow attackers to gain read access to otherwise protected resources, depending on how the library is used.
- Source
- secalert@redhat.com
- NVD status
- Analyzed
CVSS 3.1
- Type
- Primary
- Base score
- 7.5
- Impact score
- 3.6
- Exploitability score
- 3.9
- Vector string
- CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
- Severity
- HIGH
CVSS 2.0
- Type
- Primary
- Base score
- 5
- Impact score
- 2.9
- Exploitability score
- 10
- Vector string
- AV:N/AC:L/Au:N/C:P/I:N/A:N
- secalert@redhat.com
- CWE-611
- Hype score
- Not currently trending
[
{
"nodes": [
{
"negate": false,
"cpeMatch": [
{
"criteria": "cpe:2.3:a:xml\\:\\:atom_project:xml\\:\\:atom:*:*:*:*:*:perl:*:*",
"vulnerable": true,
"matchCriteriaId": "E4170090-6DF9-445F-BD39-C923CCCF5183",
"versionEndExcluding": "0.39"
}
],
"operator": "OR"
}
]
}
]