NA

CVE-2023-27476

Published: 08/03/2023 Updated: 25/06/2023
CVSS v3 Base Score: 7.5 | Impact Score: 3.6 | Exploitability Score: 3.9
VMScore: 0

Vulnerability Summary

OWSLib is a Python package for client programming with Open Geospatial Consortium (OGC) web service interface standards, and their related content models. OWSLib's XML parser (which supports both `lxml` and `xml.etree`) does not disable entity resolution, and could lead to arbitrary file reads from an attacker-controlled XML payload. This affects all XML parsing in the codebase. This issue has been addressed in version 0.28.1. All users are advised to upgrade. The only known workaround is to patch the library manually. See `GHSA-8h9c-r582-mggc` for details.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

osgeo owslib

Vendor Advisories

Debian Bug report logs - #1034182 owslib: CVE-2023-27476 Package: src:owslib; Maintainer for src:owslib is Debian GIS Project <pkg-grass-devel@listsaliothdebianorg>; Reported by: Moritz Mühlenhoff <jmm@inutilorg> Date: Mon, 10 Apr 2023 17:42:04 UTC Severity: grave Tags: security, upstream Fixed in versions owsl ...
An arbitrary file reads from malformed XML payload vulnerbility was discovered in owslib, the Python client library for Open Geospatial (OGC) web services This issue has been addressed by always using lxml as the XML parser with entity resolution disabled For the oldstable distribution (bullseye), this problem has been fixed in version 0230-1+d ...