forked from python/cpython
-
Notifications
You must be signed in to change notification settings - Fork 4
Commit
This commit does not belong to any branch on this repository, and may belong to a fork outside of the repository.
bpo-42051: Reject XML entity declarations in plist files (python#22760)…
… (GC-22801) Co-authored-by: Ronald Oussoren <ronaldoussoren@mac.com> Co-authored-by: Ned Deily <nad@python.org> Add InvalidFileException class. RaisesRegex is RaisesRegexp in python2. plistlib.loads is in the python3 version of plistlib, but there are too many changes to backport this simply.
- Loading branch information
1 parent
8ebb54f
commit 4a93947
Showing
4 changed files
with
88 additions
and
0 deletions.
There are no files selected for viewing
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,56 @@ | ||
.. bpo: 37428 | ||
.. date: 2024-02-15 | ||
.. nonce: | ||
.. release date: 2024-02-15 | ||
.. section: Core and Builtins | ||
CVE-2023-40217 | ||
|
||
SSLContext.post_handshake_auth = True no longer sets | ||
SSL_VERIFY_POST_HANDSHAKE verify flag for client connections. Although the | ||
option is documented as ignored for clients, OpenSSL implicitly enables cert | ||
chain validation when the flag is set. | ||
|
||
.. bpo: ? | ||
.. date: 2024-02-15 | ||
.. nonce: | ||
.. release date: 2024-02-15 | ||
.. section: Core and Builtins | ||
CVE-2023-24329 | ||
|
||
Start stripping C0 control and space chars in urlsplit (#… …102508) | ||
|
||
`urllib.parse.urlsplit` has already been respecting the WHATWG spec a bit #25595. | ||
|
||
This adds more sanitizing to respect the "Remove any leading C0 control or space from input" [rule](https://url.spec.whatwg.org/#url-parsing:~:text=Remove%20any%20leading%20and%20trailing%20C0%20control%20or%20space%20from%20input.) in response to [CVE-2023-24329](https://nvd.nist.gov/vuln/detail/CVE-2023-24329). | ||
|
||
.. bpo: 43882 | ||
.. date: 2024-02-15 | ||
.. nonce: | ||
.. release date: 2024-02-15 | ||
.. section: Core and Builtins | ||
CVE-2022-0391 | ||
|
||
A flaw was found in Python, specifically within the urllib.parse module. This module helps break Uniform Resource Locator (URL) strings into components. The issue involves how the urlparse method does not sanitize input and allows characters like '\r' and '\n' in the URL path. This flaw allows an attacker to input a crafted URL, leading to injection attacks. This flaw affects Python versions prior to 3.10.0b1, 3.9.5, 3.8.11, 3.7.11 and 3.6.14. | ||
|
||
.. bpo: 43285 | ||
.. date: 2024-02-15 | ||
.. nonce: | ||
.. release date: 2024-02-15 | ||
.. section: Core and Builtins | ||
CVE-2021-4189 | ||
|
||
A flaw was found in Python, specifically in the FTP (File Transfer Protocol) client library in PASV (passive) mode. The issue is how the FTP client trusts the host from the PASV response by default. This flaw allows an attacker to set up a malicious FTP server that can trick FTP clients into connecting back to a given IP address and port. This vulnerability could lead to FTP client scanning ports, which otherwise would not have been possible. | ||
|
||
.. bpo: 42051 | ||
.. date: 2024-03-12 | ||
.. nonce: | ||
.. release date: 2024-03-12 | ||
.. section: Core and Builtins | ||
CVE-2022-48565 | ||
|
||
An XML External Entity (XXE) issue was discovered in Python through 3.9.1. The plistlib module no longer accepts entity declarations in XML plist files to avoid XML vulnerabilities. |
3 changes: 3 additions & 0 deletions
3
Misc/NEWS.d/next/Security/2020-10-19-10-56-27.bpo-42051.EU_B7u.rst
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,3 @@ | ||
The :mod: module no longer accepts entity declarations in XML | ||
plist files to avoid XML vulnerabilities. This should not affect users as | ||
entity declarations are not used in regular plist files. |