[arch-security] [ASA-201512-12] python2-pyamf: XML external entity injection

Levente Polyak anthraxx at archlinux.org
Thu Dec 17 15:39:29 UTC 2015


Arch Linux Security Advisory ASA-201512-12
==========================================

Severity: Medium
Date    : 2015-12-17
CVE-ID  : CVE-2015-8549
Package : python2-pyamf
Type    : XML external entity injection
Remote  : Yes
Link    : https://wiki.archlinux.org/index.php/CVE

Summary
=======

The package python2-pyamf before version 0.8.0-2 is vulnerable to XML
external entity injection.

Resolution
==========

Upgrade to 0.8.0-2.

# pacman -Syu "python2-pyamf>=0.8.0-2"

The problem has been fixed upstream in version 0.8.0

Workaround
==========

None.

Description
===========

PyAMF suffers from insufficient AMF input payload sanitization which
results in the XML parser not preventing the processing of XML external
entities (XXE).
A specially crafted AMF payload, containing malicious references to XML
external entities, can be used to trigger denial of service (DoS)
conditions or arbitrarily return the contents of files that are
accessible with the running application privileges.

Impact
======

A remote attacker is able to craft special XML files that, when
processed, are injecting external entities resulting in denial of
service of disclosure of arbitrary file contents.

References
==========

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8549
http://www.ocert.org/advisories/ocert-2015-011.html
https://github.com/hydralabs/pyamf/pull/58

-------------- next part --------------
A non-text attachment was scrubbed...
Name: signature.asc
Type: application/pgp-signature
Size: 819 bytes
Desc: OpenPGP digital signature
URL: <https://lists.archlinux.org/pipermail/arch-security/attachments/20151217/e01f6564/attachment.asc>


More information about the arch-security mailing list