CVE-2009-5065
Severity CVSS v4.0:
Pending analysis
Type:
CWE-79
Cross-Site Scripting (XSS)
Publication date:
11/04/2011
Last modified:
11/04/2025
Description
Cross-site scripting (XSS) vulnerability in feedparser.py in Universal Feed Parser (aka feedparser or python-feedparser) before 5.0 allows remote attackers to inject arbitrary web script or HTML via vectors involving nested CDATA stanzas.
Impact
Base Score 2.0
4.30
Severity 2.0
MEDIUM
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:a:mark_pilgrim:feedparser:*:*:*:*:*:*:*:* | 4.1 (including) | |
| cpe:2.3:a:mark_pilgrim:feedparser:3.0:*:*:*:*:*:*:* | ||
| cpe:2.3:a:mark_pilgrim:feedparser:3.0.1:*:*:*:*:*:*:* | ||
| cpe:2.3:a:mark_pilgrim:feedparser:3.1:*:*:*:*:*:*:* | ||
| cpe:2.3:a:mark_pilgrim:feedparser:3.2:*:*:*:*:*:*:* | ||
| cpe:2.3:a:mark_pilgrim:feedparser:3.3:*:*:*:*:*:*:* | ||
| cpe:2.3:a:mark_pilgrim:feedparser:4.0:*:*:*:*:*:*:* | ||
| cpe:2.3:a:mark_pilgrim:feedparser:4.0.1:*:*:*:*:*:*:* | ||
| cpe:2.3:a:mark_pilgrim:feedparser:4.0.2:*:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- http://code.google.com/p/feedparser/issues/detail?id=195
- http://lists.opensuse.org/opensuse-updates/2011-04/msg00026.html
- http://secunia.com/advisories/44074
- http://support.novell.com/security/cve/CVE-2009-5065.html
- http://www.mandriva.com/security/advisories?name=MDVSA-2011%3A082
- http://www.securityfocus.com/bid/47177
- https://bugzilla.novell.com/show_bug.cgi?id=680074
- https://bugzilla.redhat.com/show_bug.cgi?id=684877
- http://code.google.com/p/feedparser/issues/detail?id=195
- http://lists.opensuse.org/opensuse-updates/2011-04/msg00026.html
- http://secunia.com/advisories/44074
- http://support.novell.com/security/cve/CVE-2009-5065.html
- http://www.mandriva.com/security/advisories?name=MDVSA-2011%3A082
- http://www.securityfocus.com/bid/47177
- https://bugzilla.novell.com/show_bug.cgi?id=680074
- https://bugzilla.redhat.com/show_bug.cgi?id=684877



