File tree Expand file tree Collapse file tree 1 file changed +6
-0
lines changed
python/ql/test/experimental/library-tests/frameworks/XML Expand file tree Collapse file tree 1 file changed +6
-0
lines changed Original file line number Diff line number Diff line change 3333parser .feed (data = x ) # $ input=x vuln='Billion Laughs' vuln='Quadratic Blowup'
3434parser .close ()
3535
36+ # manual use of feed method on XMLPullParser
37+ parser = xml .etree .ElementTree .XMLPullParser ()
38+ parser .feed (x ) # $ MISSING: input=x vuln='Billion Laughs' vuln='Quadratic Blowup'
39+ parser .feed (data = x ) # $ MISSING: input=x vuln='Billion Laughs' vuln='Quadratic Blowup'
40+ parser .close ()
41+
3642# note: it's technically possible to use the thing wrapper func `fromstring` with an
3743# `lxml` parser, and thereby change what vulnerabilities you are exposed to.. but it
3844# seems very unlikely that anyone would do this, so we have intentionally not added any
You can’t perform that action at this time.
0 commit comments