Miggo Logo

CVE-2023-27476: OWSLib vulnerable to XML External Entity (XXE) Injection

8.2

CVSS Score
3.1

Basic Information

EPSS Score
0.32243%
Published
3/7/2023
Updated
10/7/2024
KEV Status
No
Technology
TechnologyPython

Technical Details

CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:L
Package NameEcosystemVulnerable VersionsFirst Patched Version
OWSLibpip< 0.28.10.28.1

Vulnerability Intelligence
Miggo AIMiggo AI

Miggo AIRoot Cause Analysis

The analysis focused on identifying functions directly related to the XML parsing and processing that were modified to address the XXE vulnerability. The primary evidence comes from the changes in owslib/etree.py and the usage of lxml's etree.set_default_parser function.

Vulnerable functions

Only Mi**o us*rs **n s** t*is s**tion

WAF Protection Rules

WAF Rule

### Imp**t OWSLi*'s XML p*rs*r (w*i** supports *ot* `lxml` *n* `xml.*tr**`) *o*s not *is**l* *ntity r*solution *or `lxml`, *n* *oul* l*** to *r*itr*ry *il* r***s *rom *n *tt**k*r-*ontroll** XML p*ylo**. T*is *****ts *ll XML p*rsin* in t** *o****s*.

Reasoning

T** *n*lysis *o*us** on i**nti*yin* *un*tions *ir**tly r*l*t** to t** XML p*rsin* *n* pro**ssin* t**t w*r* mo*i*i** to ***r*ss t** XX* vuln*r**ility. T** prim*ry *vi**n** *om*s *rom t** ***n**s in owsli*/*tr**.py *n* t** us*** o* lxml's *tr**.s*t_***