petl before 1.68, in some configurations, allows resolution of entities in an XML document.
The product does not properly neutralize special elements that are used in XML, allowing attackers to modify the syntax, content, or commands of the XML before it is processed by an end system.
Link | Tags |
---|---|
https://github.com/petl-developers/petl/pull/527 | third party advisory patch |
https://petl.readthedocs.io/en/stable/changes.html | release notes vendor advisory |
https://github.com/petl-developers/petl/issues/526 | issue tracking third party advisory |
https://github.com/petl-developers/petl/compare/v1.6.7...v1.6.8 | third party advisory patch |
https://github.com/petl-developers/petl/pull/527/commits/1b0a09f08c3cdfe2e69647bd02f97c1367a5b5f8 | third party advisory patch |
https://github.com/petl-developers/petl/security/advisories/GHSA-f5gc-p5m3-v347 | third party advisory |
https://github.com/nvn1729/advisories/blob/master/cve-2020-29128.md | third party advisory |