You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
{{ message }}
OWSLib vulnerable to XML External Entity (XXE) Injection
High severity
GitHub Reviewed
Published
Mar 6, 2023
in
geopython/OWSLib
•
Updated Oct 7, 2024
OWSLib's XML parser (which supports both lxml and xml.etree) does not disable entity resolution for lxml, and could lead to arbitrary file reads from an attacker-controlled XML payload. This affects all XML parsing in the codebase.
Patches
Use only lxml for XML handling, adding resolve_entities=False to lxml's parser: geopython/OWSLib#863
Impact
OWSLib's XML parser (which supports both
lxml
andxml.etree
) does not disable entity resolution forlxml
, and could lead to arbitrary file reads from an attacker-controlled XML payload. This affects all XML parsing in the codebase.Patches
resolve_entities=False
tolxml
's parser: geopython/OWSLib#863Workarounds
References
GHSL-2022-131
References