Vulnerability Details : CVE-2020-29128
petl before 1.68, in some configurations, allows resolution of entities in an XML document.
Products affected by CVE-2020-29128
- cpe:2.3:a:petl_project:petl:*:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2020-29128
1.88%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 82 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2020-29128
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
6.8
|
MEDIUM | AV:N/AC:M/Au:N/C:P/I:P/A:P |
8.6
|
6.4
|
NIST | |
9.8
|
CRITICAL | CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H |
3.9
|
5.9
|
NIST |
CWE ids for CVE-2020-29128
-
The product does not properly neutralize special elements that are used in XML, allowing attackers to modify the syntax, content, or commands of the XML before it is processed by an end system.Assigned by: nvd@nist.gov (Primary)
References for CVE-2020-29128
-
https://github.com/petl-developers/petl/issues/526
Security issue · Issue #526 · petl-developers/petl · GitHubIssue Tracking;Third Party Advisory
-
https://petl.readthedocs.io/en/stable/changes.html
Changes — petl 1.6.8 documentationRelease Notes;Vendor Advisory
-
https://github.com/petl-developers/petl/compare/v1.6.7...v1.6.8
Comparing v1.6.7...v1.6.8 · petl-developers/petl · GitHubPatch;Third Party Advisory
-
https://github.com/petl-developers/petl/pull/527
Added new parameter parser in fromxml() for custom parsers by juarezr · Pull Request #527 · petl-developers/petl · GitHubPatch;Third Party Advisory
-
https://github.com/petl-developers/petl/pull/527/commits/1b0a09f08c3cdfe2e69647bd02f97c1367a5b5f8
Added new parameter parser in fromxml() for custom parsers by juarezr · Pull Request #527 · petl-developers/petl · GitHubPatch;Third Party Advisory
-
https://github.com/petl-developers/petl/security/advisories/GHSA-f5gc-p5m3-v347
CVE-2020-29128: XXE in petl < 1.68 · Advisory · petl-developers/petl · GitHubThird Party Advisory
-
https://github.com/nvn1729/advisories/blob/master/cve-2020-29128.md
advisories/cve-2020-29128.md at master · nvn1729/advisories · GitHubThird Party Advisory
Jump to