[1.3.x] Don't characterize XML vulnerabilities as DoS-only.
This commit is contained in:
parent
747d3f0d03
commit
2378c31430
|
@ -39,12 +39,11 @@ XML deserialization
|
||||||
-------------------
|
-------------------
|
||||||
|
|
||||||
The XML parser in the Python standard library is vulnerable to a number of
|
The XML parser in the Python standard library is vulnerable to a number of
|
||||||
denial-of-service attacks via external entities and entity expansion. Django
|
attacks via external entities and entity expansion. Django uses this parser for
|
||||||
uses this parser for deserializing XML-formatted database fixtures. The fixture
|
deserializing XML-formatted database fixtures. The fixture deserializer is not
|
||||||
deserializer is not intended for use with untrusted data, but in order to err
|
intended for use with untrusted data, but in order to err on the side of safety
|
||||||
on the side of safety in Django 1.3.6 the XML deserializer refuses to parse an
|
in Django 1.3.6 the XML deserializer refuses to parse an XML document with a
|
||||||
XML document with a DTD (DOCTYPE definition), which closes off these attack
|
DTD (DOCTYPE definition), which closes off these attack avenues.
|
||||||
avenues.
|
|
||||||
|
|
||||||
These issues in the Python standard library are CVE-2013-1664 and
|
These issues in the Python standard library are CVE-2013-1664 and
|
||||||
CVE-2013-1665. More information available `from the Python security team`_.
|
CVE-2013-1665. More information available `from the Python security team`_.
|
||||||
|
|
Loading…
Reference in New Issue