It was discovered that the XML::Atom Perl module before version 0.39 did not disable external entities when parsing XML from potentially untrusted sources. This may allow attackers to gain read access to otherwise protected resources, depending on how the library is used.
The product processes an XML document that can contain XML entities with URIs that resolve to documents outside of the intended sphere of control, causing the product to embed incorrect documents into its output.
Link | Tags |
---|---|
https://metacpan.org/release/MIYAGAWA/XML-Atom-0.39/source/Changes | third party advisory release notes |
https://seclists.org/oss-sec/2012/q1/549 | mailing list exploit third party advisory |