10000 bpo-42051: Reject XML entity declarations in plist files (#22760) (GC-22801) by icanhasmath · Pull Request #39 · ActiveState/cpython · GitHub
[go: up one dir, main page]

Skip to content

bpo-42051: Reject XML entity declarations in plist files (#22760) (GC-22801) #39

New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Merged
merged 1 commit into from
Mar 12, 2024
Merged
Show file tree
Hide file tree
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
7 changes: 7 additions & 0 deletions Lib/plistlib.py
Original file line number Diff line number Diff line change
Expand Up @@ -403,9 +403,16 @@ def parse(self, fileobj):
parser.StartElementHandler = self.handleBeginElement
parser.EndElementHandler = self.handleEndElement
parser.CharacterDataHandler = self.handleData
parser.EntityDeclHandler = self.handle_entity_decl
parser.ParseFile(fileobj)
return self.root

def handle_entity_decl(self, entity_name, is_parameter_entity, value, base, system_id, public_id, notation_name):
# Reject plist files with entity declarations to avoid XML vulnerabilies in expat.
# Regular plist files don't contain those declerations, and Apple's plutil tool does not
# accept them either.
raise InvalidFileException("XML entity declarations are not supported in plist files")

def handleBeginElement(self, element, attrs):
self.data = []
handler = getattr(self, "begin_" + element, None)
Expand Down
17 changes: 17 additions & 0 deletions Lib/test/test_plistlib.py
Original file line number Diff line number Diff line change
Expand Up @@ -86,6 +86,19 @@
</plist>
""".replace(" " * 8, "\t") # Apple as well as plistlib.py output hard tabs

XML_PLIST_WITH_ENTITY=b'''\
<?xml version="1.0" encoding="UTF-8"?>
<!DOCTYPE plist PUBLIC "-//Apple//DTD PLIST 1.0//EN" "http://www.apple.com/DTDs/PropertyList-1.0.dtd" [
<!ENTITY entity "replacement text">
]>
<plist version="1.0">
<dict>
<key>A</key>
<string>&entity;</string>
</dict>
</plist>
'''


class TestPlistlib(unittest.TestCase):

Expand Down Expand Up @@ -195,6 +208,10 @@ def test_nondictroot(self):
self.assertEqual(test1, result1)
self.assertEqual(test2, result2)

def test_xml_plist_with_entity_decl(self):
with self.assertRaisesRegex(plistlib.InvalidFileException,
"XML entity declarations are not supported"):
plistlib.loads(XML_PLIST_WITH_ENTITY, fmt=plistlib.FMT_XML)

def test_main():
test_support.run_unittest(TestPlistlib)
Expand Down
10 changes: 10 additions & 0 deletions Misc/NEWS.d/2.7.18.8.rst
Original file line number Diff line number Diff line change
Expand Up @@ -44,3 +44,13 @@ A flaw was found in Python, specifically within the urllib.parse module. This mo
CVE-2021-4189

A flaw was found in Python, specifically in the FTP (File Transfer Protocol) client library in PASV (passive) mode. The issue is how the FTP client trusts the host from the PASV response by default. This flaw allows an attacker to set up a malicious FTP server that can trick FTP clients into connecting back to a given IP address and port. This vulnerability could lead to FTP client scanning ports, which otherwise would not have been possible.

.. bpo: 42051
.. date: 2024-03-12
.. nonce:
.. release date: 2024-03-12
.. section: Core and Builtins

CVE-2022-48565

An XML External Entity (XXE) issue was discovered in Python through 3.9.1. The plistlib module no longer accepts entity declarations in XML plist files to avoid XML vulnerabilities.
Original file line number Diff line number Diff line change
@@ -0,0 +1,3 @@
The :mod: module no longer accepts entity declarations in XML
plist files to avoid XML vulnerabilities. This should not affect users as
entity declarations are not used in regular plist files.
0