{"containers":{"cna":{"affected":[{"product":"Go","vendor":"Golang","versions":[{"status":"affected","version":"All versions"}]}],"datePublic":"2020-12-14T00:00:00.000Z","descriptions":[{"lang":"en","value":"The encoding/xml package in Go (all versions) does not correctly preserve the semantics of attribute namespace prefixes during tokenization round-trips, which allows an attacker to craft inputs that behave in conflicting ways during different stages of processing in affected downstream applications."}],"metrics":[{"cvssV3_1":{"attackComplexity":"LOW","attackVector":"NETWORK","availabilityImpact":"HIGH","baseScore":9.8,"baseSeverity":"CRITICAL","confidentialityImpact":"HIGH","integrityImpact":"HIGH","privilegesRequired":"NONE","scope":"UNCHANGED","userInteraction":"NONE","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H","version":"3.1"}}],"problemTypes":[{"descriptions":[{"cweId":"CWE-115","description":"CWE-115 Misinterpretation of Input","lang":"en","type":"CWE"}]}],"providerMetadata":{"dateUpdated":"2021-01-29T06:06:07.000Z","orgId":"9302f53e-dde5-4bf3-b2f2-a83f91ac0eee","shortName":"Mattermost"},"references":[{"tags":["x_refsource_MISC"],"url":"https://github.com/mattermost/xml-roundtrip-validator/blob/master/advisories/unstable-attributes.md"},{"tags":["x_refsource_CONFIRM"],"url":"https://security.netapp.com/advisory/ntap-20210129-0006/"}],"source":{"discovery":"UNKNOWN"},"workarounds":[{"lang":"en","value":"Untrusted markup in affected applications can be validated using the github.com/mattermost/xml-roundtrip-validator module."}],"x_generator":{"engine":"Vulnogram 0.0.9"},"x_legacyV4Record":{"CVE_data_meta":{"ASSIGNER":"responsibledisclosure@mattermost.com","DATE_PUBLIC":"2020-12-14T08:00:00.000Z","ID":"CVE-2020-29509","STATE":"PUBLIC"},"affects":{"vendor":{"vendor_data":[{"product":{"product_data":[{"product_name":"Go","version":{"version_data":[{"version_value":"All versions"}]}}]},"vendor_name":"Golang"}]}},"data_format":"MITRE","data_type":"CVE","data_version":"4.0","description":{"description_data":[{"lang":"eng","value":"The encoding/xml package in Go (all versions) does not correctly preserve the semantics of attribute namespace prefixes during tokenization round-trips, which allows an attacker to craft inputs that behave in conflicting ways during different stages of processing in affected downstream applications."}]},"generator":{"engine":"Vulnogram 0.0.9"},"impact":{"cvss":{"attackComplexity":"LOW","attackVector":"NETWORK","availabilityImpact":"HIGH","baseScore":9.8,"baseSeverity":"CRITICAL","confidentialityImpact":"HIGH","integrityImpact":"HIGH","privilegesRequired":"NONE","scope":"UNCHANGED","userInteraction":"NONE","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H","version":"3.1"}},"problemtype":{"problemtype_data":[{"description":[{"lang":"eng","value":"CWE-115 Misinterpretation of Input"}]}]},"references":{"reference_data":[{"name":"https://github.com/mattermost/xml-roundtrip-validator/blob/master/advisories/unstable-attributes.md","refsource":"MISC","url":"https://github.com/mattermost/xml-roundtrip-validator/blob/master/advisories/unstable-attributes.md"},{"name":"https://security.netapp.com/advisory/ntap-20210129-0006/","refsource":"CONFIRM","url":"https://security.netapp.com/advisory/ntap-20210129-0006/"}]},"source":{"discovery":"UNKNOWN"},"work_around":[{"lang":"en","value":"Untrusted markup in affected applications can be validated using the github.com/mattermost/xml-roundtrip-validator module."}]}},"adp":[{"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2024-08-04T16:55:10.642Z"},"title":"CVE Program Container","references":[{"tags":["x_refsource_MISC","x_transferred"],"url":"https://github.com/mattermost/xml-roundtrip-validator/blob/master/advisories/unstable-attributes.md"},{"tags":["x_refsource_CONFIRM","x_transferred"],"url":"https://security.netapp.com/advisory/ntap-20210129-0006/"}]}]},"cveMetadata":{"assignerOrgId":"9302f53e-dde5-4bf3-b2f2-a83f91ac0eee","assignerShortName":"Mattermost","cveId":"CVE-2020-29509","datePublished":"2020-12-14T20:02:02.448Z","dateReserved":"2020-12-03T00:00:00.000Z","dateUpdated":"2024-09-17T03:43:39.703Z","state":"PUBLISHED"},"dataType":"CVE_RECORD","dataVersion":"5.1"}