Name | CVE-2021-32796 |
Description | xmldom is an open source pure JavaScript W3C standard-based (XML DOM Level 2 Core) DOMParser and XMLSerializer module. xmldom versions 0.6.0 and older do not correctly escape special characters when serializing elements removed from their ancestor. This may lead to unexpected syntactic changes during XML processing in some downstream applications. This issue has been resolved in version 0.7.0. As a workaround downstream applications can validate the input and reject the maliciously crafted documents. |
Source | CVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more) |
Debian Bugs | 991612 |
Vulnerable and fixed packages
The table below lists information on source packages.
Source Package | Release | Version | Status |
---|
node-xmldom (PTS) | bullseye | 0.5.0-1+deb11u2 | vulnerable |
| bookworm, trixie | 0.8.6-1 | fixed |
| sid | 0.9.5-1 | fixed |
The information below is based on the following data on fixed versions.
Package | Type | Release | Fixed Version | Urgency | Origin | Debian Bugs |
---|
node-xmldom | source | (unstable) | 0.7.3-1 | | | 991612 |
Notes
[bullseye] - node-xmldom <ignored> (Minor issue, too intrusive to backport)
[buster] - node-xmldom <ignored> (Minor issue, too intrusive to backport)
https://github.com/xmldom/xmldom/security/advisories/GHSA-5fg8-2547-mr8q
https://github.com/xmldom/xmldom/commit/7b4b743917a892d407356e055b296dcd6d107e8b