petl before 1.68, in some configurations, allows resolution of entities in an XML document.
References
Link | Resource |
---|---|
https://petl.readthedocs.io/en/stable/changes.html | Release Notes Vendor Advisory |
https://github.com/petl-developers/petl/pull/527 | Patch Third Party Advisory |
https://github.com/petl-developers/petl/compare/v1.6.7...v1.6.8 | Patch Third Party Advisory |
https://github.com/petl-developers/petl/pull/527/commits/1b0a09f08c3cdfe2e69647bd02f97c1367a5b5f8 | Patch Third Party Advisory |
https://github.com/petl-developers/petl/issues/526 | Issue Tracking Third Party Advisory |
https://github.com/petl-developers/petl/security/advisories/GHSA-f5gc-p5m3-v347 | Third Party Advisory |
https://github.com/nvn1729/advisories/blob/master/cve-2020-29128.md | Third Party Advisory |
Configurations
Information
Published : 2020-11-25 21:15
Updated : 2020-12-03 08:48
NVD link : CVE-2020-29128
Mitre link : CVE-2020-29128
JSON object : View
CWE
CWE-91
XML Injection (aka Blind XPath Injection)
Products Affected
petl_project
- petl