mirror of
https://github.com/github/codeql.git
synced 2025-12-19 02:13:17 +01:00
Python: Add test for XMLPullParser
But handling this in a nice way will require some restructuring
This commit is contained in:
@@ -33,6 +33,12 @@ parser.feed(x) # $ input=x vuln='Billion Laughs' vuln='Quadratic Blowup'
|
|||||||
parser.feed(data=x) # $ input=x vuln='Billion Laughs' vuln='Quadratic Blowup'
|
parser.feed(data=x) # $ input=x vuln='Billion Laughs' vuln='Quadratic Blowup'
|
||||||
parser.close()
|
parser.close()
|
||||||
|
|
||||||
|
# manual use of feed method on XMLPullParser
|
||||||
|
parser = xml.etree.ElementTree.XMLPullParser()
|
||||||
|
parser.feed(x) # $ MISSING: input=x vuln='Billion Laughs' vuln='Quadratic Blowup'
|
||||||
|
parser.feed(data=x) # $ MISSING: input=x vuln='Billion Laughs' vuln='Quadratic Blowup'
|
||||||
|
parser.close()
|
||||||
|
|
||||||
# note: it's technically possible to use the thing wrapper func `fromstring` with an
|
# note: it's technically possible to use the thing wrapper func `fromstring` with an
|
||||||
# `lxml` parser, and thereby change what vulnerabilities you are exposed to.. but it
|
# `lxml` parser, and thereby change what vulnerabilities you are exposed to.. but it
|
||||||
# seems very unlikely that anyone would do this, so we have intentionally not added any
|
# seems very unlikely that anyone would do this, so we have intentionally not added any
|
||||||
|
|||||||
Reference in New Issue
Block a user