The encoding/xml package in Go (all versions) does not correctly preserve the semantics of attribute namespace prefixes during tokenization round-trips, which allows an attacker to craft inputs that behave in conflicting ways during different stages of processing in affected downstream applications.

Project Subscriptions

Vendors Products
Trident Subscribe
Advisories
Source ID Title
EUVD EUVD EUVD-2022-1254 The encoding/xml package in Go (all versions) does not correctly preserve the semantics of attribute namespace prefixes during tokenization round-trips, which allows an attacker to craft inputs that behave in conflicting ways during different stages of processing in affected downstream applications.
Github GHSA Github GHSA GHSA-xhqq-x44f-9fgg Authentication Bypass in github.com/russellhaering/gosaml2
Fixes

Solution

No solution given by the vendor.


Workaround

Untrusted markup in affected applications can be validated using the github.com/mattermost/xml-roundtrip-validator module.

History

No history.

Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: Mattermost

Published:

Updated: 2024-09-17T03:43:39.703Z

Reserved: 2020-12-03T00:00:00

Link: CVE-2020-29509

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2020-12-14T20:15:13.060

Modified: 2024-11-21T05:24:08.877

Link: CVE-2020-29509

cve-icon Redhat

Severity : Low

Publid Date: 2020-12-14T00:00:00Z

Links: CVE-2020-29509 - Bugzilla

cve-icon OpenCVE Enrichment

No data.

Weaknesses