Feature #4162
Updated by Ruben S. Montero over 5 years ago
This issue has been renamed to sanitize other XML documents through oned, when they include user inputs.
Original issue:
[PATCH] Sanitize LibVirt XML Document for QEMU/KVM
Currently any user input can be passed to the generated XML document passed to libvirt, which could cause security issues (e.g., arbitrary code execution using the <emulator> tag or arbitrary file access using -hda/-drive/etc).
Attached is a patch to sanitize this, as well as remove the "DATA" section from being processed, this should be updated to look through the DATA section for known-good fragments that can be selectively added.
Original issue:
[PATCH] Sanitize LibVirt XML Document for QEMU/KVM
Currently any user input can be passed to the generated XML document passed to libvirt, which could cause security issues (e.g., arbitrary code execution using the <emulator> tag or arbitrary file access using -hda/-drive/etc).
Attached is a patch to sanitize this, as well as remove the "DATA" section from being processed, this should be updated to look through the DATA section for known-good fragments that can be selectively added.