First published: Thu Dec 22 2016(Updated: )
perl-XML-Twig: The option to `expand_external_ents`, documented as controlling external entity expansion in XML::Twig does not work. External entities are always expanded, regardless of the option's setting.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
SUSE Perl XML::Twig |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2016-9180 is considered a moderate severity vulnerability due to its potential impact on XML data processing.
To mitigate CVE-2016-9180, update to a patched version of XML::Twig that resolves the external entity expansion issue.
The impact of CVE-2016-9180 allows for unauthorized external entity expansion, which can lead to data breaches or application-level attacks.
CVE-2016-9180 affects XML-Twig for Perl where the option to control external entity expansion is ineffective.
Yes, CVE-2016-9180 can be exploited remotely if an attacker can provide malicious XML input to the application using XML::Twig.