yahoo-eng-team team mailing list archive
-
yahoo-eng-team team
-
Mailing list archive
-
Message #70789
[Bug 1745353] Re: xml vulnerability in ovf process
*** This bug is a duplicate of bug 1625402 ***
https://bugs.launchpad.net/bugs/1625402
@Tristan: thanks for looking it up, I forgot all about bug 1625402.
Marking this as a duplicate as you suggested.
** This bug has been marked a duplicate of bug 1625402
Authenticated "Billion laughs" memory exhaustion / DoS vulnerability in ovf_process.py
--
You received this bug notification because you are a member of Yahoo!
Engineering Team, which is subscribed to Glance.
https://bugs.launchpad.net/bugs/1745353
Title:
xml vulnerability in ovf process
Status in Glance:
Triaged
Status in OpenStack Security Advisory:
Incomplete
Bug description:
I scanned glance with Bandit and found a potential vulnerability in
xml processing related to parsing OVF file.
Output from Bandit:
Using xml.etree.ElementTree.iterparse to parse untrusted XML data is known to be vulnerable to XML attacks. Replace xml.etree.ElementTree.iterparse with its defusedxml equivalent function or make sure defusedxml.defuse_stdlib() is called.
We should use defusedxml library, because user can pass dangerous data
through ovf file.
To manage notifications about this bug go to:
https://bugs.launchpad.net/glance/+bug/1745353/+subscriptions