Commit cac611b
committed
fix: resolve Snyk CWE-611 (XXE) and CWE-643 (XPath injection) in report scripts
Use defusedxml for XML parsing in both HTML report scripts to fix insecure parser (XXE/DDoS).
Add Scripts/requirements.txt with defusedxml>=0.7.0.
Replace dynamic XPath with a safe lookup (find all UnitTest, match by id in Python) in both scripts to fix XPath injection.1 parent c42e211 commit cac611b
File tree
2 files changed
+4
-4
lines changed- Scripts
2 files changed
+4
-4
lines changed| Original file line number | Diff line number | Diff line change | |
|---|---|---|---|
| |||
158 | 158 | | |
159 | 159 | | |
160 | 160 | | |
161 | | - | |
| 161 | + | |
162 | 162 | | |
163 | | - | |
| 163 | + | |
164 | 164 | | |
165 | 165 | | |
166 | 166 | | |
| |||
| Original file line number | Diff line number | Diff line change | |
|---|---|---|---|
| |||
78 | 78 | | |
79 | 79 | | |
80 | 80 | | |
81 | | - | |
| 81 | + | |
82 | 82 | | |
83 | | - | |
| 83 | + | |
84 | 84 | | |
85 | 85 | | |
86 | 86 | | |
| |||
0 commit comments