-
Notifications
You must be signed in to change notification settings - Fork 117
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Invalid XML security version #624
Comments
Should be an easy fix by @cehbrecht / @tomkralidis |
…curity issue (relatees to geopython/pywps#616, geopython/pywps#618 amd geopython/pywps#624)
…curity issue (relates to geopython/pywps#616, geopython/pywps#618 and geopython/pywps#624)
@fmigneault I have contacted the author of this CVE. The author will update the CVE with minimum version 4.4.5. |
…curity issue (relates to geopython/pywps#616, geopython/pywps#618 and geopython/pywps#624)
It looks like a change was pushed, but still incorrect (up to https://nvd.nist.gov/vuln/detail/CVE-2021-39371#VulnChangeHistorySection
While editing this, can https://github.com/crim-ca/weaver also be added for minimal |
@fmigneault ... it looks like the CVE is already corrected with version 4.4.5. The CVE wasn't opened by me. Do you want to add I have no experience with this. Personally I would say it is a bug in |
I see the update to Weaver can be added to the same CVE since it heavily depends on |
I have contacted the author of the CVE to add |
Description
Since the introduction of #621 and release
4.5.0
in #613, tools that track security/dependency updates likepyup
are flagging the following:from:
https://pyup.io/repos/github/crim-ca/weaver/commits/?page=1#a586cb79de278fdc33d6eeee5feb6f6233f60a16
Because XML security specific to that issue was handled in #618, which is tagged after in
4.4.5
, the requirement should beinjection in PyWPS before 4.4.5
, an mark the minimum requirement as4.4.5
rather than4.5.0
.I would like to have a revision of the security advisory for the lower version for 2 reasons:
4.5.0
introduces some important changes relative toogc-api
, which are not trivial to guarantee backward compatibility with existing services that did not expect them to be there.4.5.x
branch should be either a development branch until4.6.x
or addition ofogc-api
should introduce5.x
releases. Either way,4.5.0
is not a "ready" release (as shown by tests still failing), and suggesting users to fix the XML security should not be done at the same time as new features integration.Currently, I am receiving a lot of warnings regarding this security issue, and I cannot directly/safely update to
4.5.0
yet until it is properly validated.The text was updated successfully, but these errors were encountered: