Vulnerability Details : CVE-2021-21366
xmldom is a pure JavaScript W3C standard-based (XML DOM Level 2 Core) DOMParser and XMLSerializer module. xmldom versions 0.4.0 and older do not correctly preserve system identifiers, FPIs or namespaces when repeatedly parsing and serializing maliciously crafted documents. This may lead to unexpected syntactic changes during XML processing in some downstream applications. This is fixed in version 0.5.0. As a workaround downstream applications can validate the input and reject the maliciously crafted documents.
Products affected by CVE-2021-21366
- cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*
- cpe:2.3:a:xmldom_project:xmldom:*:*:*:*:*:node.js:*:*
Exploit prediction scoring system (EPSS) score for CVE-2021-21366
0.15%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 52 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2021-21366
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
4.3
|
MEDIUM | AV:N/AC:M/Au:N/C:N/I:P/A:N |
8.6
|
2.9
|
NIST | |
4.3
|
MEDIUM | CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N |
2.8
|
1.4
|
NIST | |
4.3
|
MEDIUM | CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N |
2.8
|
1.4
|
GitHub, Inc. |
CWE ids for CVE-2021-21366
-
The product misinterprets an input, whether from an attacker or another product, in a security-relevant fashion.Assigned by: security-advisories@github.com (Primary)
-
Product A handles inputs or steps differently than Product B, which causes A to perform incorrect actions based on its perception of B's state.Assigned by:
- nvd@nist.gov (Secondary)
- security-advisories@github.com (Primary)
References for CVE-2021-21366
-
https://github.com/xmldom/xmldom/releases/tag/0.5.0
Release 0.5.0 · xmldom/xmldom · GitHubRelease Notes
-
https://www.npmjs.com/package/xmldom
xmldom - npmProduct
-
https://github.com/xmldom/xmldom/security/advisories/GHSA-h6q6-9hqw-rwfv
Misinterpretation of malicious XML input · Advisory · xmldom/xmldom · GitHubVendor Advisory
-
https://github.com/xmldom/xmldom/commit/d4201b9dfbf760049f457f9f08a3888d48835135
Merge pull request from GHSA-h6q6-9hqw-rwfv · xmldom/xmldom@d4201b9 · GitHubPatch
-
https://lists.debian.org/debian-lts-announce/2023/01/msg00000.html
[SECURITY] [DLA 3260-1] node-xmldom security updateMailing List;Third Party Advisory
Jump to