CVE-2012-1102

Source
https://nvd.nist.gov/vuln/detail/CVE-2012-1102
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2012-1102.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2012-1102
Related
Published
2021-07-09T11:15:07Z
Modified
2024-11-21T01:36:25Z
Severity
  • 7.5 (High) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N CVSS Calculator
Summary
[none]
Details

It was discovered that the XML::Atom Perl module before version 0.39 did not disable external entities when parsing XML from potentially untrusted sources. This may allow attackers to gain read access to otherwise protected resources, depending on how the library is used.

References

Affected packages

Debian:11 / libxml-atom-perl

Package

Name
libxml-atom-perl
Purl
pkg:deb/debian/libxml-atom-perl?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
0.39-1

Ecosystem specific

{
    "urgency": "medium"
}

Debian:12 / libxml-atom-perl

Package

Name
libxml-atom-perl
Purl
pkg:deb/debian/libxml-atom-perl?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
0.39-1

Ecosystem specific

{
    "urgency": "medium"
}

Debian:13 / libxml-atom-perl

Package

Name
libxml-atom-perl
Purl
pkg:deb/debian/libxml-atom-perl?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
0.39-1

Ecosystem specific

{
    "urgency": "medium"
}