The encoding/xml package in Go versions 1.15 and earlier does not correctly preserve the semantics of directives during tokenization round-trips, which allows an attacker to craft inputs that behave in conflicting ways during different stages of processing in affected downstream applications.
No PoCs from references.
- https://github.com/ARPSyndicate/cve-scores
- https://github.com/ARPSyndicate/cvemon
- https://github.com/JakubWierzchowski/manier
- https://github.com/agadecki/malware-cryptominer-container
- https://github.com/henriquebesing/container-security
- https://github.com/kb5fls/container-security
- https://github.com/ruzickap/malware-cryptominer-container