Security Advisories (1)
CVE-2012-1102 (2021-07-09)

It was discovered that the XML::Atom Perl module before version 0.39 did not disable external entities when parsing XML from potentially untrusted sources. This may allow attackers to gain read access to otherwise protected resources, depending on how the library is used.

NAME

XML::Atom::Entry - Atom entry

SYNOPSIS

use XML::Atom::Entry;
my $entry = XML::Atom::Entry->new;
$entry->title('My Post');
$entry->content('The content of my post.');
my $xml = $entry->as_xml;
my $dc = XML::Atom::Namespace->new(dc => 'http://purl.org/dc/elements/1.1/');
$entry->set($dc->subject, 'Food & Drink');

USAGE

XML::Atom::Entry->new

Creates and returns a new entry object.

$entry->content([ $content ])

Returns the content of the entry. If $content is given, sets the content of the entry. Automatically handles all necessary escaping.

$entry->author([ $author ])

Returns an XML::Atom::Author object representing the author of the entry, or undef if there is no author information present.

If $author is supplied, it should be an XML::Atom::Author object representing the author. For example:

my $author = XML::Atom::Author->new;
$author->name('Foo Bar');
$author->email('foo@bar.com');
$entry->author($author);

AUTHOR & COPYRIGHT

Please see the XML::Atom manpage for author, copyright, and license information.