gh-115399: Document CVE-2023-52425 under "XML vulnerabilities" (GH-115400)
Doc/library/xml.rst: Document CVE-2023-52425 under "XML vulnerabilities"
This commit is contained in:
parent
e4c34f04a1
commit
fbd40ce46e
@ -68,6 +68,7 @@ quadratic blowup **Vulnerable** (1) **Vulnerable** (1) **Vulnerable*
|
|||||||
external entity expansion Safe (5) Safe (2) Safe (3) Safe (5) Safe (4)
|
external entity expansion Safe (5) Safe (2) Safe (3) Safe (5) Safe (4)
|
||||||
`DTD`_ retrieval Safe (5) Safe Safe Safe (5) Safe
|
`DTD`_ retrieval Safe (5) Safe Safe Safe (5) Safe
|
||||||
decompression bomb Safe Safe Safe Safe **Vulnerable**
|
decompression bomb Safe Safe Safe Safe **Vulnerable**
|
||||||
|
large tokens **Vulnerable** (6) **Vulnerable** (6) **Vulnerable** (6) **Vulnerable** (6) **Vulnerable** (6)
|
||||||
========================= ================== ================== ================== ================== ==================
|
========================= ================== ================== ================== ================== ==================
|
||||||
|
|
||||||
1. Expat 2.4.1 and newer is not vulnerable to the "billion laughs" and
|
1. Expat 2.4.1 and newer is not vulnerable to the "billion laughs" and
|
||||||
@ -81,6 +82,11 @@ decompression bomb Safe Safe Safe
|
|||||||
4. :mod:`xmlrpc.client` doesn't expand external entities and omits them.
|
4. :mod:`xmlrpc.client` doesn't expand external entities and omits them.
|
||||||
5. Since Python 3.7.1, external general entities are no longer processed by
|
5. Since Python 3.7.1, external general entities are no longer processed by
|
||||||
default.
|
default.
|
||||||
|
6. Expat 2.6.0 and newer is not vulnerable to denial of service
|
||||||
|
through quadratic runtime caused by parsing large tokens.
|
||||||
|
Items still listed as vulnerable due to
|
||||||
|
potential reliance on system-provided libraries. Check
|
||||||
|
:const:`!pyexpat.EXPAT_VERSION`.
|
||||||
|
|
||||||
|
|
||||||
billion laughs / exponential entity expansion
|
billion laughs / exponential entity expansion
|
||||||
@ -114,6 +120,13 @@ decompression bomb
|
|||||||
files. For an attacker it can reduce the amount of transmitted data by three
|
files. For an attacker it can reduce the amount of transmitted data by three
|
||||||
magnitudes or more.
|
magnitudes or more.
|
||||||
|
|
||||||
|
large tokens
|
||||||
|
Expat needs to re-parse unfinished tokens; without the protection
|
||||||
|
introduced in Expat 2.6.0, this can lead to quadratic runtime that can
|
||||||
|
be used to cause denial of service in the application parsing XML.
|
||||||
|
The issue is known as
|
||||||
|
`CVE-2023-52425 <https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52425>`_.
|
||||||
|
|
||||||
The documentation for `defusedxml`_ on PyPI has further information about
|
The documentation for `defusedxml`_ on PyPI has further information about
|
||||||
all known attack vectors with examples and references.
|
all known attack vectors with examples and references.
|
||||||
|
|
||||||
|
@ -0,0 +1 @@
|
|||||||
|
Document CVE-2023-52425 of Expat <2.6.0 under "XML vulnerabilities".
|
Loading…
x
Reference in New Issue
Block a user