It was discovered that the XML::Atom Perl module before version 0.39 did not disable external entities when parsing XML from potentially untrusted sources. This may allow attackers to gain read access to otherwise protected resources, depending on how the library is used.
                
            References
                    | Link | Resource | 
|---|---|
| https://metacpan.org/release/MIYAGAWA/XML-Atom-0.39/source/Changes | Release Notes Third Party Advisory | 
| https://seclists.org/oss-sec/2012/q1/549 | Exploit Mailing List Third Party Advisory | 
| https://metacpan.org/release/MIYAGAWA/XML-Atom-0.39/source/Changes | Release Notes Third Party Advisory | 
| https://seclists.org/oss-sec/2012/q1/549 | Exploit Mailing List Third Party Advisory | 
Configurations
                    History
                    21 Nov 2024, 01:36
| Type | Values Removed | Values Added | 
|---|---|---|
| References | () https://metacpan.org/release/MIYAGAWA/XML-Atom-0.39/source/Changes - Release Notes, Third Party Advisory | |
| References | () https://seclists.org/oss-sec/2012/q1/549 - Exploit, Mailing List, Third Party Advisory | 
Information
                Published : 2021-07-09 11:15
Updated : 2024-11-21 01:36
NVD link : CVE-2012-1102
Mitre link : CVE-2012-1102
CVE.ORG link : CVE-2012-1102
JSON object : View
Products Affected
                xml\
- \
CWE
                
                    
                        
                        CWE-611
                        
            Improper Restriction of XML External Entity Reference
