First published: Mon Dec 14 2020(Updated: )
The encoding/xml package in Go (all versions) does not correctly preserve the semantics of element namespace prefixes during tokenization round-trips, which allows an attacker to craft inputs that behave in conflicting ways during different stages of processing in affected downstream applications.
Credit: responsibledisclosure@mattermost.com responsibledisclosure@mattermost.com
Affected Software | Affected Version | How to fix |
---|---|---|
Go | <1.17 | |
NetApp Astra Trident |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2020-29511 is critical with a CVSS score of 5.6.
CVE-2020-29511 is a vulnerability in the encoding/xml package in Go that allows attackers to craft inputs that behave in conflicting ways during different stages of processing.
The Go programming language (all versions up to 1.17) and NetApp Trident are affected by CVE-2020-29511.
An attacker can exploit CVE-2020-29511 by crafting inputs that manipulate the semantics of element namespace prefixes during tokenization round-trips.
Yes, the references for CVE-2020-29511 are available at the following URLs: [GitHub Advisory](https://github.com/mattermost/xml-roundtrip-validator/blob/master/advisories/unstable-elements.md) and [NetApp Advisory](https://security.netapp.com/advisory/ntap-20210129-0006/).