Description
xmldom is an open source pure JavaScript W3C standard-based (XML DOM Level 2 Core) DOMParser and XMLSerializer module. xmldom versions 0.6.0 and older do not correctly escape special characters when serializing elements removed from their ancestor. This may lead to unexpected syntactic changes during XML processing in some downstream applications. This issue has been resolved in version 0.7.0. As a workaround downstream applications can validate the input and reject the maliciously crafted documents.
Published: 2021-07-27
Score: 6.5 Medium
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

No analysis available yet.

Remediation

No remediation available yet.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
EUVD EUVD EUVD-2021-1574 xmldom is an open source pure JavaScript W3C standard-based (XML DOM Level 2 Core) DOMParser and XMLSerializer module. xmldom versions 0.6.0 and older do not correctly escape special characters when serializing elements removed from their ancestor. This may lead to unexpected syntactic changes during XML processing in some downstream applications. This issue has been resolved in version 0.7.0. As a workaround downstream applications can validate the input and reject the maliciously crafted documents.
Github GHSA Github GHSA GHSA-5fg8-2547-mr8q Misinterpretation of malicious XML input
History

No history.

Subscriptions

Xmldom Project Xmldom
cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2024-08-03T23:33:55.989Z

Reserved: 2021-05-12T00:00:00.000Z

Link: CVE-2021-32796

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2021-07-27T22:15:07.690

Modified: 2024-11-21T06:07:45.660

Link: CVE-2021-32796

cve-icon Redhat

Severity : Moderate

Publid Date: 2021-07-27T00:00:00Z

Links: CVE-2021-32796 - Bugzilla

cve-icon OpenCVE Enrichment

No data.

Weaknesses