Lucene search

K
githubGitHub Advisory DatabaseGHSA-8H9C-R582-MGGC
HistoryMar 07, 2023 - 8:41 p.m.

OWSLib vulnerable to XML External Entity (XXE) Injection

2023-03-0720:41:36
CWE-611
GitHub Advisory Database
github.com
8
owslib
xml
parser
vulnerability
patched
lxml
xml.etree
xxe
injection
entity resolution
file reads
xml payload
codebase
patches
workarounds
ghsl-2022-131

8.2 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

NONE

Availability Impact

LOW

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:L

0.001 Low

EPSS

Percentile

51.0%

Impact

OWSLib’s XML parser (which supports both lxml and xml.etree) does not disable entity resolution for lxml, and could lead to arbitrary file reads from an attacker-controlled XML payload. This affects all XML parsing in the codebase.

Patches

Workarounds

patch_well_known_namespaces(etree)
etree.set_default_parser(
    parser=etree.XMLParser(resolve_entities=False)
)

References

Affected configurations

Vulners
Node
osgeoowslibRange<0.28.1
CPENameOperatorVersion
owsliblt0.28.1

8.2 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

NONE

Availability Impact

LOW

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:L

0.001 Low

EPSS

Percentile

51.0%