CVE-2023-34411: xml-rs vulnerable to denial of service via invalid token in XML document
(updated )
The xml-rs crate >= 0.8.9 and < 0.8.14 for Rust and Crab allows a denial of service (panic) via an invalid <! token (such as <!DOCTYPEs/%<!A nesting) in an XML document.
References
- github.com/00xc/xml-rs/commit/0f084d45aa53e4a27476961785f59f2bd7d59a9f
- github.com/advisories/GHSA-7gf7-jv65-wjmh
- github.com/netvl/xml-rs
- github.com/netvl/xml-rs/commit/014d808be900c85a0afc5ccdfe668be040d175aa
- github.com/netvl/xml-rs/commit/c09549a187e62d39d40467f129e64abf32efc35c
- github.com/netvl/xml-rs/compare/0.8.13...0.8.14
- github.com/netvl/xml-rs/pull/226
- nvd.nist.gov/vuln/detail/CVE-2023-34411
Detect and mitigate CVE-2023-34411 with GitLab Dependency Scanning
Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →