translate-toolkit before version 2.2.0 is vulnerable to XML External Entity Execution. An attacker could exploit this by supplying a maliciously crafted .XLF file causing an arbitrary file read or potential arbitrary code execution. References: https://bugzilla.novell.com/show_bug.cgi?id=1073535 https://github.com/translate/translate/pull/3632/files https://hackerone.com/reports/232614
Created translate-toolkit tracking bugs for this issue: Affects: epel-all [bug 1527790]