[Python-Dev] XML DoS vulnerabilities and exploits in Python (original) (raw)

Nick Coghlan ncoghlan at gmail.com
Thu Feb 21 01:38:07 CET 2013


On Thu, Feb 21, 2013 at 9:49 AM, Tres Seaver <tseaver at palladion.com> wrote:

Two words: "hash randomization". If it applies to one, it applies to the other.

Agreed. Christian's suggested approach sounds sane to me:

A possible alternative in to step 1 is loud warnings in the docs directing people to defusedxml, but I prefer the idea of actually making the safeguards available directly in the standard library.

Regards, Nick.

-- Nick Coghlan | ncoghlan at gmail.com | Brisbane, Australia



More information about the Python-Dev mailing list