Thanks to visit codestin.com Credit goes to github.com
We read every piece of feedback, and take your input very seriously.
To see all available qualifiers, see our documentation.
1 parent 33ebcdf commit 46238d5Copy full SHA for 46238d5
1 file changed
python/ql/test/experimental/library-tests/frameworks/XML/xml_etree.py
@@ -33,6 +33,12 @@
33
parser.feed(data=x) # $ input=x vuln='Billion Laughs' vuln='Quadratic Blowup'
34
parser.close()
35
36
+# manual use of feed method on XMLPullParser
37
+parser = xml.etree.ElementTree.XMLPullParser()
38
+parser.feed(x) # $ MISSING: input=x vuln='Billion Laughs' vuln='Quadratic Blowup'
39
+parser.feed(data=x) # $ MISSING: input=x vuln='Billion Laughs' vuln='Quadratic Blowup'
40
+parser.close()
41
+
42
# note: it's technically possible to use the thing wrapper func `fromstring` with an
43
# `lxml` parser, and thereby change what vulnerabilities you are exposed to.. but it
44
# seems very unlikely that anyone would do this, so we have intentionally not added any
0 commit comments