| 
									
										
										
										
											2012-10-06 13:49:34 +02:00
										 |  |  | .. _xml:
 | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  | XML Processing Modules
 | 
					
						
							|  |  |  | ======================
 | 
					
						
							|  |  |  | 
 | 
					
						
							| 
									
										
										
										
											2013-03-26 17:35:55 +01:00
										 |  |  | .. module:: xml
 | 
					
						
							|  |  |  |    :synopsis: Package containing XML processing modules
 | 
					
						
							| 
									
										
										
										
											2016-06-11 15:02:54 -04:00
										 |  |  | 
 | 
					
						
							| 
									
										
										
										
											2013-03-26 17:35:55 +01:00
										 |  |  | .. sectionauthor:: Christian Heimes <christian@python.org>
 | 
					
						
							|  |  |  | .. sectionauthor:: Georg Brandl <georg@python.org>
 | 
					
						
							|  |  |  | 
 | 
					
						
							| 
									
										
										
										
											2016-06-11 15:02:54 -04:00
										 |  |  | **Source code:** :source:`Lib/xml/`
 | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  | --------------
 | 
					
						
							| 
									
										
										
										
											2013-03-26 17:35:55 +01:00
										 |  |  | 
 | 
					
						
							| 
									
										
										
										
											2012-10-06 13:49:34 +02:00
										 |  |  | Python's interfaces for processing XML are grouped in the ``xml`` package.
 | 
					
						
							|  |  |  | 
 | 
					
						
							| 
									
										
										
										
											2025-07-07 11:03:07 +02:00
										 |  |  | .. note::
 | 
					
						
							| 
									
										
										
										
											2013-03-26 17:35:55 +01:00
										 |  |  | 
 | 
					
						
							| 
									
										
										
										
											2025-07-07 11:03:07 +02:00
										 |  |  |    If you need to parse untrusted or unauthenticated data, see
 | 
					
						
							|  |  |  |    :ref:`xml-security`.
 | 
					
						
							| 
									
										
										
										
											2013-03-26 17:47:23 +01:00
										 |  |  | 
 | 
					
						
							| 
									
										
										
										
											2012-10-06 13:49:34 +02:00
										 |  |  | It is important to note that modules in the :mod:`xml` package require that
 | 
					
						
							|  |  |  | there be at least one SAX-compliant XML parser available. The Expat parser is
 | 
					
						
							|  |  |  | included with Python, so the :mod:`xml.parsers.expat` module will always be
 | 
					
						
							|  |  |  | available.
 | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  | The documentation for the :mod:`xml.dom` and :mod:`xml.sax` packages are the
 | 
					
						
							|  |  |  | definition of the Python bindings for the DOM and SAX interfaces.
 | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  | The XML handling submodules are:
 | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  | * :mod:`xml.etree.ElementTree`: the ElementTree API, a simple and lightweight
 | 
					
						
							| 
									
										
										
										
											2014-01-31 11:30:36 -06:00
										 |  |  |   XML processor
 | 
					
						
							| 
									
										
										
										
											2012-10-06 13:49:34 +02:00
										 |  |  | 
 | 
					
						
							|  |  |  | ..
 | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  | * :mod:`xml.dom`: the DOM API definition
 | 
					
						
							| 
									
										
										
										
											2013-12-22 01:57:01 +01:00
										 |  |  | * :mod:`xml.dom.minidom`: a minimal DOM implementation
 | 
					
						
							| 
									
										
										
										
											2012-10-06 13:49:34 +02:00
										 |  |  | * :mod:`xml.dom.pulldom`: support for building partial DOM trees
 | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  | ..
 | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  | * :mod:`xml.sax`: SAX2 base classes and convenience functions
 | 
					
						
							|  |  |  | * :mod:`xml.parsers.expat`: the Expat parser binding
 | 
					
						
							| 
									
										
										
										
											2013-03-26 17:35:55 +01:00
										 |  |  | 
 | 
					
						
							|  |  |  | 
 | 
					
						
							| 
									
										
										
										
											2025-07-07 11:03:07 +02:00
										 |  |  | .. _xml-security:
 | 
					
						
							| 
									
										
										
										
											2013-03-26 17:35:55 +01:00
										 |  |  | .. _xml-vulnerabilities:
 | 
					
						
							|  |  |  | 
 | 
					
						
							| 
									
										
										
										
											2025-07-07 11:03:07 +02:00
										 |  |  | XML security
 | 
					
						
							|  |  |  | ------------
 | 
					
						
							| 
									
										
										
										
											2013-03-26 17:35:55 +01:00
										 |  |  | 
 | 
					
						
							| 
									
										
										
										
											2014-02-15 15:33:44 -05:00
										 |  |  | An attacker can abuse XML features to carry out denial of service attacks,
 | 
					
						
							|  |  |  | access local files, generate network connections to other machines, or
 | 
					
						
							|  |  |  | circumvent firewalls.
 | 
					
						
							| 
									
										
										
										
											2013-03-26 17:35:55 +01:00
										 |  |  | 
 | 
					
						
							| 
									
										
										
										
											2025-07-07 11:03:07 +02:00
										 |  |  | Expat versions lower that 2.6.0 may be vulnerable to "billion laughs",
 | 
					
						
							|  |  |  | "quadratic blowup" and "large tokens". Python may be vulnerable if it uses such
 | 
					
						
							|  |  |  | older versions of Expat as a system-provided library.
 | 
					
						
							|  |  |  | Check :const:`!pyexpat.EXPAT_VERSION`.
 | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  | :mod:`xmlrpc` is **vulnerable** to the "decompression bomb" attack.
 | 
					
						
							| 
									
										
										
										
											2013-03-26 17:35:55 +01:00
										 |  |  | 
 | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  | billion laughs / exponential entity expansion
 | 
					
						
							|  |  |  |   The `Billion Laughs`_ attack -- also known as exponential entity expansion --
 | 
					
						
							|  |  |  |   uses multiple levels of nested entities. Each entity refers to another entity
 | 
					
						
							| 
									
										
										
										
											2014-02-15 15:33:44 -05:00
										 |  |  |   several times, and the final entity definition contains a small string.
 | 
					
						
							|  |  |  |   The exponential expansion results in several gigabytes of text and
 | 
					
						
							|  |  |  |   consumes lots of memory and CPU time.
 | 
					
						
							| 
									
										
										
										
											2013-03-26 17:35:55 +01:00
										 |  |  | 
 | 
					
						
							|  |  |  | quadratic blowup entity expansion
 | 
					
						
							|  |  |  |   A quadratic blowup attack is similar to a `Billion Laughs`_ attack; it abuses
 | 
					
						
							|  |  |  |   entity expansion, too. Instead of nested entities it repeats one large entity
 | 
					
						
							|  |  |  |   with a couple of thousand chars over and over again. The attack isn't as
 | 
					
						
							| 
									
										
										
										
											2014-02-15 15:33:44 -05:00
										 |  |  |   efficient as the exponential case but it avoids triggering parser countermeasures
 | 
					
						
							| 
									
										
										
										
											2022-07-05 05:16:10 -04:00
										 |  |  |   that forbid deeply nested entities.
 | 
					
						
							| 
									
										
										
										
											2013-03-26 17:35:55 +01:00
										 |  |  | 
 | 
					
						
							|  |  |  | decompression bomb
 | 
					
						
							| 
									
										
										
										
											2014-02-15 15:33:44 -05:00
										 |  |  |   Decompression bombs (aka `ZIP bomb`_) apply to all XML libraries
 | 
					
						
							|  |  |  |   that can parse compressed XML streams such as gzipped HTTP streams or
 | 
					
						
							|  |  |  |   LZMA-compressed
 | 
					
						
							| 
									
										
										
										
											2013-03-26 17:35:55 +01:00
										 |  |  |   files. For an attacker it can reduce the amount of transmitted data by three
 | 
					
						
							|  |  |  |   magnitudes or more.
 | 
					
						
							|  |  |  | 
 | 
					
						
							| 
									
										
										
										
											2024-02-21 12:26:16 +01:00
										 |  |  | large tokens
 | 
					
						
							|  |  |  |   Expat needs to re-parse unfinished tokens; without the protection
 | 
					
						
							|  |  |  |   introduced in Expat 2.6.0, this can lead to quadratic runtime that can
 | 
					
						
							|  |  |  |   be used to cause denial of service in the application parsing XML.
 | 
					
						
							| 
									
										
										
										
											2024-04-15 21:22:00 +03:00
										 |  |  |   The issue is known as :cve:`2023-52425`.
 | 
					
						
							| 
									
										
										
										
											2024-02-21 12:26:16 +01:00
										 |  |  | 
 | 
					
						
							| 
									
										
										
										
											2016-02-26 19:37:12 +01:00
										 |  |  | .. _Billion Laughs: https://en.wikipedia.org/wiki/Billion_laughs
 | 
					
						
							|  |  |  | .. _ZIP bomb: https://en.wikipedia.org/wiki/Zip_bomb
 |