Description
The encoding/xml package in Go (all versions) does not correctly preserve the semantics of attribute namespace prefixes during tokenization round-trips, which allows an attacker to craft inputs that behave in conflicting ways during different stages of processing in affected downstream applications.
No analysis available yet.
Remediation
Vendor Workaround
Untrusted markup in affected applications can be validated using the github.com/mattermost/xml-roundtrip-validator module.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2022-1254 | The encoding/xml package in Go (all versions) does not correctly preserve the semantics of attribute namespace prefixes during tokenization round-trips, which allows an attacker to craft inputs that behave in conflicting ways during different stages of processing in affected downstream applications. |
Github GHSA |
GHSA-xhqq-x44f-9fgg | Authentication Bypass in github.com/russellhaering/gosaml2 |
References
History
No history.
Status: PUBLISHED
Assigner: Mattermost
Published:
Updated: 2024-09-17T03:43:39.703Z
Reserved: 2020-12-03T00:00:00.000Z
Link: CVE-2020-29509
No data.
Status : Modified
Published: 2020-12-14T20:15:13.060
Modified: 2024-11-21T05:24:08.877
Link: CVE-2020-29509
OpenCVE Enrichment
No data.
Weaknesses
EUVD
Github GHSA