← Back to team overview

yahoo-eng-team team mailing list archive

[Bug 1745353] Re: xml vulnerability in ovf process

 

*** This bug is a duplicate of bug 1625402 ***
    https://bugs.launchpad.net/bugs/1625402

@Tristan: thanks for looking it up, I forgot all about bug 1625402.
Marking this as a duplicate as you suggested.

** This bug has been marked a duplicate of bug 1625402
   Authenticated "Billion laughs" memory exhaustion / DoS vulnerability in ovf_process.py

-- 
You received this bug notification because you are a member of Yahoo!
Engineering Team, which is subscribed to Glance.
https://bugs.launchpad.net/bugs/1745353

Title:
  xml vulnerability in ovf process

Status in Glance:
  Triaged
Status in OpenStack Security Advisory:
  Incomplete

Bug description:
  I scanned glance with Bandit and found a potential vulnerability in
  xml processing related to parsing OVF file.

  Output from Bandit:
  Using xml.etree.ElementTree.iterparse to parse untrusted XML data is known to be vulnerable to XML attacks. Replace xml.etree.ElementTree.iterparse with its defusedxml equivalent function or make sure defusedxml.defuse_stdlib() is called.

  We should use defusedxml library, because user can pass dangerous data
  through ovf file.

To manage notifications about this bug go to:
https://bugs.launchpad.net/glance/+bug/1745353/+subscriptions