Security
Headlines
HeadlinesLatestCVEs

Headline

Debian Security Advisory 5426-1

Debian Linux Security Advisory 5426-1 - An arbitrary file reads from malformed XML payload vulnerability was discovered in owslib, the Python client library for Open Geospatial (OGC) web services. This issue has been addressed by always using lxml as the XML parser with entity resolution disabled.

Packet Storm
#vulnerability#web#linux#debian
-----BEGIN PGP SIGNED MESSAGE-----Hash: SHA256- -------------------------------------------------------------------------Debian Security Advisory DSA-5426-1                   [email protected]://www.debian.org/security/                                  Aron XuJune 14, 2023                         https://www.debian.org/security/faq- -------------------------------------------------------------------------Package        : owslibCVE ID         : CVE-2023-27476Debian Bug     : 1034182An arbitrary file reads from malformed XML payload vulnerbility wasdiscovered in owslib, the Python client library for Open Geospatial (OGC)web services. This issue has been addressed by always using lxml as theXML parser with entity resolution disabled.For the oldstable distribution (bullseye), this problem has been fixedin version 0.23.0-1+deb11u1.We recommend that you upgrade your owslib packages.For the detailed security status of owslib please refer toits security tracker page at:https://security-tracker.debian.org/tracker/owslibFurther information about Debian Security Advisories, how to applythese updates to your system and frequently asked questions can befound at: https://www.debian.org/security/Mailing list: [email protected] PGP SIGNATURE-----iQEzBAEBCAAdFiEEhhz+aYQl/Bp4OTA7O1LKKgqv2VQFAmSJH/AACgkQO1LKKgqv2VQBugf9EQeMoKzsAYfAG6NTgqF9hu5+SMNAlv2IsHzTJZwL8nOpXXhBDq6h2kvYwIScctrpjlJCOulvsYptnVS7hzHt/KqUSXzTap7fg4JxWkpaOylvcLvIwcbPbKSY7KzpWk1mdvePj+ktFaFx/IGKzCD95FGZhMqBhHJc8yPWoZUG3zaL2E8X99gBOVdjFHz6OIhjChaDTGfMr8sV7EpNR5YshFVSeTamysyIGxZe41KWg5mxbnFO8BpIZHWl9Tuz64xhp/QO9SjCDBWbd8zOuoouvaEtXgf8MyJjvPZkTX5PMIFvIVkKP3NHBnH6MUo1mXDUIA7PStjost53yEkU7caRWQ==DwF9-----END PGP SIGNATURE-----

Related news

CVE-2023-27476: XML External Entity (XXE) Injection in OWSLib

OWSLib is a Python package for client programming with Open Geospatial Consortium (OGC) web service interface standards, and their related content models. OWSLib's XML parser (which supports both `lxml` and `xml.etree`) does not disable entity resolution, and could lead to arbitrary file reads from an attacker-controlled XML payload. This affects all XML parsing in the codebase. This issue has been addressed in version 0.28.1. All users are advised to upgrade. The only known workaround is to patch the library manually. See `GHSA-8h9c-r582-mggc` for details.

GHSA-8h9c-r582-mggc: OWSLib vulnerable to XML External Entity (XXE) Injection

### Impact OWSLib's XML parser (which supports both `lxml` and `xml.etree`) does not disable entity resolution, and could lead to arbitrary file reads from an attacker-controlled XML payload. This affects all XML parsing in the codebase. ### Patches This issue is patched in 0.28.1. ### Workarounds The patch approach should be: - update all XML support as follows: - use ONLY `lxml.etree` - apply the patch below ```python patch_well_known_namespaces(etree) etree.set_default_parser( parser=etree.XMLParser(resolve_entities=False) ) ``` ### References - `GHSL-2022-131`

Packet Storm: Latest News

Acronis Cyber Protect/Backup Remote Code Execution