First published: Tue Mar 07 2023(Updated: )
### Impact OWSLib's XML parser (which supports both `lxml` and `xml.etree`) does not disable entity resolution for `lxml`, and could lead to arbitrary file reads from an attacker-controlled XML payload. This affects all XML parsing in the codebase. ### Patches - Use only lxml for XML handling, adding `resolve_entities=False` to `lxml`'s parser: https://github.com/geopython/OWSLib/pull/863 ### Workarounds ```python patch_well_known_namespaces(etree) etree.set_default_parser( parser=etree.XMLParser(resolve_entities=False) ) ``` ### References - [`GHSL-2022-131`](https://securitylab.github.com/advisories/GHSL-2022-131_OWSLib/)
Credit: security-advisories@github.com security-advisories@github.com
Affected Software | Affected Version | How to fix |
---|---|---|
Osgeo Owslib | <0.28.1 | |
debian/owslib | <=0.17.1-1 | 0.17.1-1+deb10u1 0.23.0-1+deb11u1 0.27.2-3 0.29.2-1 |
pip/OWSLib | <0.28.1 | 0.28.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-27476 is a vulnerability in the OWSLib Python package that allows arbitrary file reads from the file system.
CVE-2023-27476 occurs because OWSLib's XML parser does not disable entity resolution.
CVE-2023-27476 has a severity rating of 7.5 (high).
OWSLib versions up to and including 0.28.1 are affected by CVE-2023-27476.
To fix CVE-2023-27476, update OWSLib to version 0.29.2-1 or higher.