Skip to content

xmlquery lacks check for whether LoadURL response is in XML format, causing denial of service

Critical severity GitHub Reviewed Published Oct 7, 2022 to the GitHub Advisory Database • Updated May 30, 2024

Package

gomod github.com/antchfx/xmlquery (Go)

Affected versions

< 1.3.1

Patched versions

1.3.1

Description

xmlquery before 1.3.1 lacks a check for whether a LoadURL response is in the XML format, which allows attackers to cause a denial of service (SIGSEGV) at xmlquery.(*Node).InnerText or possibly have unspecified other impact.

References

Published by the National Vulnerability Database Sep 16, 2020
Published to the GitHub Advisory Database Oct 7, 2022
Reviewed Oct 7, 2022
Last updated May 30, 2024

Severity

Critical
9.8
/ 10

CVSS base metrics

Attack vector
Network
Attack complexity
Low
Privileges required
None
User interaction
None
Scope
Unchanged
Confidentiality
High
Integrity
High
Availability
High
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

CVE ID

CVE-2020-25614

GHSA ID

GHSA-93m7-c69f-5cfj

Source code

Loading Checking history
See something to contribute? Suggest improvements for this vulnerability.