Vulnerabilities/

fast-xml-parser vulnerable to Regex Injection via Doctype Entities

Severity:
High

Description

“fast-xml-parser” allows special characters in entity names, which are not escaped or sanitized. Since the entity name is used for creating a regex for searching and replacing entities in the XML body, an attacker can abuse it for DoS attacks.

Recommendation

Update the fast-xml-parser package to the latest compatible version. Followings are version details:

References

Related Issues

Tags:
npm
fast-xml-parser
Anything's wrong? Let us know Last updated on January 25, 2024

This issue is available in SmartScanner Professional

See Pricing