First published: Thu Jun 29 2023(Updated: )
requests-xml v0.2.3 was discovered to contain an XML External Entity Injection (XXE) vulnerability which allows attackers to execute arbitrary code via a crafted XML file.
Credit: cve@mitre.org cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
pip/requests-xml | <=0.2.3 | |
Requests | =0.2.3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2020-26708 is a vulnerability in requests-xml v0.2.3 that allows for XML External Entity Injection (XXE) which can lead to arbitrary code execution.
CVE-2020-26708 affects requests-xml v0.2.3 by allowing attackers to execute arbitrary code through a crafted XML file.
CVE-2020-26708 has a severity rating of 7.5, indicating a high severity vulnerability.
To fix CVE-2020-26708, upgrade to a version of requests-xml that is not affected by the vulnerability, such as a version higher than 0.2.3.
You can find more information about CVE-2020-26708 on the GitHub issue page (https://github.com/erinxocon/requests-xml/issues/7), the NetApp security advisory (https://security.netapp.com/advisory/ntap-20230908-0003/), and the NIST CVE database (https://nvd.nist.gov/vuln/detail/CVE-2020-26708).