Skip to content
This repository has been archived by the owner on Dec 28, 2024. It is now read-only.

SOAPpy: XML billion laughs attack unfixed for client #17

Open
thoger opened this issue Jan 5, 2015 · 0 comments
Open

SOAPpy: XML billion laughs attack unfixed for client #17

thoger opened this issue Jan 5, 2015 · 0 comments

Comments

@thoger
Copy link

thoger commented Jan 5, 2015

Commit 64125a2 fixes billion laughs issue in SOAPpy. However, the way forbid_* defaults were chosen and how client and server parts call parseSOAPRPC, client side remains vulnerable to the billion laughs attack. Malicious SOAP server can cause SOAPpy client to use excessive amount of memory and CPU time.

FWIW, the _parseSOAP arguments seem confusing, given that ignore_ext overlaps with forbid_*, and that setting it to true disables not only external entities as the argument name suggests, but also internal entities.

Sign up for free to subscribe to this conversation on GitHub. Already have an account? Sign in.
Labels
None yet
Projects
None yet
Development

No branches or pull requests

1 participant