Security Advisories (1)
CVE-2012-1102 (2021-07-09)

It was discovered that the XML::Atom Perl module before version 0.39 did not disable external entities when parsing XML from potentially untrusted sources. This may allow attackers to gain read access to otherwise protected resources, depending on how the library is used.

Changes for version 0.12

  • Documentation fixes for XML::Atom::Server. Thanks to Tatsuhiko Miyagawa for the patch.
  • Removed XML::LibXSLT usage. Too much pain for too little gain. To be clear: all it was doing was namespace normalization, so removing it should make no difference.
  • Fixed _utf8_off bug in XML::Atom::Client that causes fatal error in POSTing multibyte content (Tatsuhiko Miyagawa, Masayoshi Sekimura)
  • Added XML::Atom::Thing::add method to allow $entry->add() (Tatsuhiko Miyagawa)

Modules

Atom feed and API implementation
A client for the Atom API
Atom entry
Atom feed
Author or contributor object
A server for the Atom API
Utility functions

Provides

in lib/XML/Atom/Client.pm
in lib/XML/Atom/Content.pm
in lib/XML/Atom/ErrorHandler.pm
in lib/XML/Atom/Link.pm
in lib/XML/Atom.pm
in lib/XML/Atom/Thing.pm