First published: Mon Dec 14 2020(Updated: )
The encoding/xml package in Go (all versions) does not correctly preserve the semantics of attribute namespace prefixes during tokenization round-trips, which allows an attacker to craft inputs that behave in conflicting ways during different stages of processing in affected downstream applications.
Credit: responsibledisclosure@mattermost.com responsibledisclosure@mattermost.com
Affected Software | Affected Version | How to fix |
---|---|---|
Go | <1.17 | |
NetApp Astra Trident |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2020-29509 is critical with a CVSS score of 5.6.
All versions of Go up to (but not including) 1.17 and Netapp Trident are affected by CVE-2020-29509.
CVE-2020-29509 affects the encoding/xml package in Go by not correctly preserving the semantics of attribute namespace prefixes during tokenization round-trips.
An attacker can craft inputs that behave in conflicting ways during different stages of processing in affected downstream applications.
Yes, you can find references for CVE-2020-29509 at the following links: [GitHub Advisory](https://github.com/mattermost/xml-roundtrip-validator/blob/master/advisories/unstable-attributes.md) and [Netapp Advisory](https://security.netapp.com/advisory/ntap-20210129-0006/).