Vulnerability Details : CVE-2012-1102
Potential exploit
It was discovered that the XML::Atom Perl module before version 0.39 did not disable external entities when parsing XML from potentially untrusted sources. This may allow attackers to gain read access to otherwise protected resources, depending on how the library is used.
Vulnerability category: XML external entity (XXE) injection
Products affected by CVE-2012-1102
- cpe:2.3:a:xml\:\:atom_project:xml\:\:atom:*:*:*:*:*:perl:*:*
Exploit prediction scoring system (EPSS) score for CVE-2012-1102
0.29%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 50 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2012-1102
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
5.0
|
MEDIUM | AV:N/AC:L/Au:N/C:P/I:N/A:N |
10.0
|
2.9
|
NIST | |
7.5
|
HIGH | CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N |
3.9
|
3.6
|
NIST |
CWE ids for CVE-2012-1102
-
The product processes an XML document that can contain XML entities with URIs that resolve to documents outside of the intended sphere of control, causing the product to embed incorrect documents into its output.Assigned by: secalert@redhat.com (Primary)
References for CVE-2012-1102
-
https://metacpan.org/release/MIYAGAWA/XML-Atom-0.39/source/Changes
Changes - metacpan.orgRelease Notes;Third Party Advisory
-
https://seclists.org/oss-sec/2012/q1/549
oss-sec: Re: CVE Request: XML entity expansion in the XML::Atom Perl moduleExploit;Mailing List;Third Party Advisory
Jump to