First published: Fri Mar 12 2021(Updated: )
xmldom is a pure JavaScript W3C standard-based (XML DOM Level 2 Core) DOMParser and XMLSerializer module. xmldom versions 0.4.0 and older do not correctly preserve system identifiers, FPIs or namespaces when repeatedly parsing and serializing maliciously crafted documents. This may lead to unexpected syntactic changes during XML processing in some downstream applications. This is fixed in version 0.5.0. As a workaround downstream applications can validate the input and reject the maliciously crafted documents.
Credit: security-advisories@github.com
Affected Software | Affected Version | How to fix |
---|---|---|
xmldom | <0.5.0 | |
Debian GNU/Linux | =10.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-21366 is considered a moderate severity vulnerability due to its impact on the integrity of XML processing.
To fix CVE-2021-21366, upgrade to xmldom version 0.5.0 or later to ensure proper handling of system identifiers and namespaces.
CVE-2021-21366 affects xmldom versions 0.4.0 and earlier, along with specific installations of Debian GNU/Linux 10.0.
CVE-2021-21366 involves improper preservation of system identifiers, FPIs, and namespaces during XML parsing and serialization.
Yes, CVE-2021-21366 can potentially lead to data leakage or manipulation as it affects the fidelity of XML document processing.