漏洞信息
尽管我们使用了先进的大模型技术,但其输出仍可能包含不准确或过时的信息。神龙努力确保数据的准确性,但请您根据实际情况进行核实和判断。
Vulnerability Title
fast-xml-parser has an entity encoding bypass via regex injection in DOCTYPE entity names
Vulnerability Description
fast-xml-parser allows users to validate XML, parse XML to JS object, or build XML from JS object without C/C++ based libraries and no callback. From 4.1.3to before 5.3.5, a dot (.) in a DOCTYPE entity name is treated as a regex wildcard during entity replacement, allowing an attacker to shadow built-in XML entities (<, >, &, ", ') with arbitrary values. This bypasses entity encoding and leads to XSS when parsed output is rendered. This vulnerability is fixed in 5.3.5.
CVSS Information
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:H/A:N
Vulnerability Type
不正确的正则表达式
Vulnerability Title
fast-xml-parser 安全漏洞
Vulnerability Description
fast-xml-parser是Natural Intelligence开源的一个库。用于在没有基于 C/C++ 的库和回调的情况下,快速验证 XML、解析 XML 和构建 XML。 fast-xml-parser 4.1.3版本至5.3.5之前版本存在安全漏洞,该漏洞源于DOCTYPE实体名称中的点被当作正则表达式通配符处理,可能导致跨站脚本攻击。
CVSS Information
N/A
Vulnerability Type
N/A