First published: Mon Dec 14 2020(Updated: )
The encoding/xml package in Go versions 1.15 and earlier does not correctly preserve the semantics of directives during tokenization round-trips, which allows an attacker to craft inputs that behave in conflicting ways during different stages of processing in affected downstream applications.
Credit: responsibledisclosure@mattermost.com
Affected Software | Affected Version | How to fix |
---|---|---|
Golang Go | <=1.15 | |
Netapp Trident |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2020-29510 is a vulnerability in the encoding/xml package in Go versions 1.15 and earlier.
The severity of CVE-2020-29510 is critical with a severity value of 5.6.
The affected software versions are Golang Go up to and including 1.15, and Netapp Trident.
CVE-2020-29510 can allow an attacker to craft inputs that behave in conflicting ways during different stages of processing in affected downstream applications.
You can find more information about CVE-2020-29510 at the following references: [GitHub](https://github.com/mattermost/xml-roundtrip-validator/blob/master/advisories/unstable-directives.md) and [Netapp Security Advisories](https://security.netapp.com/advisory/ntap-20210129-0006/).