xml2rfc@3.14.2 vulnerabilities

xml2rfc generates RFCs and IETF drafts from document source in XML according to the IETF xml2rfc v2 and v3 vocabularies.

  • latest version

    3.31.0

  • latest non vulnerable version

  • first published

    14 years ago

  • latest version published

    2 months ago

  • licenses detected

  • Direct Vulnerabilities

    Known vulnerabilities in the xml2rfc package. This does not include vulnerabilities belonging to this package’s dependencies.

    Fix vulnerabilities automatically

    Snyk's AI Trust Platform automatically finds the best upgrade path and integrates with your development workflows. Secure your code at zero cost.

    Fix for free
    VulnerabilityVulnerable Version
    • H
    Directory Traversal

    xml2rfc is a Xml2rfc generates RFCs and IETF drafts from document source in XML according to the IETF xml2rfc v2 and v3 vocabularies.

    Affected versions of this package are vulnerable to Directory Traversal via the processing of link elements with rel="attachment" in prepped RFCXML files. An attacker can access arbitrary files on the filesystem by injecting malicious elements into the input XML file.

    How to fix Directory Traversal?

    Upgrade xml2rfc to version 3.30.2 or higher.

    [,3.30.2)
    • H
    Directory Traversal

    xml2rfc is a Xml2rfc generates RFCs and IETF drafts from document source in XML according to the IETF xml2rfc v2 and v3 vocabularies.

    Affected versions of this package are vulnerable to Directory Traversal via the PDF generation process. An attacker can access arbitrary files on the filesystem by injecting a malicious link element into the XML input.

    How to fix Directory Traversal?

    Upgrade xml2rfc to version 3.30.1 or higher.

    [,3.30.1)
    • M
    Directory Traversal

    xml2rfc is a Xml2rfc generates RFCs and IETF drafts from document source in XML according to the IETF xml2rfc v2 and v3 vocabularies.

    Affected versions of this package are vulnerable to Directory Traversal through the src attribute in artwork or sourcecode elements due to improper enforcement of --allow-local-file-access flag. An attacker can view or use contents from local files by specifying a file path that leads to sensitive data. This is only exploitable if the XML input source file is located in the same directory as the target file or a subdirectory thereof.

    How to fix Directory Traversal?

    Upgrade xml2rfc to version 3.27.0 or higher.

    [3.12.0,3.27.0)