nova/nova/virt/libvirt/driver.py
What's getting parsed is XML from libvirt, not user-provided XML requests. So that's safe.
nova/nova/virt/xenapi/vm_utils.py
What's getting parsed is XML from XenServer, not user-provided XML requests, so that's safe.
nova/nova/api/openstack/compute/contrib/security_groups.py
While most calls use xmlutil.safe_minidom_parse_string (which is safe), there is one call in _extend_servers that still uses minidom.parseString(req.body) and therefore looks vulnerable.
nova/nova/api/openstack/compute/contrib/security_group_default_rules.py
Uses pure minidom in its XML deserializer, so probably vulnerable.
Analysis in Nova:
nova/nova/ virt/libvirt/ driver. py
What's getting parsed is XML from libvirt, not user-provided XML requests. So that's safe.
nova/nova/ virt/xenapi/ vm_utils. py
What's getting parsed is XML from XenServer, not user-provided XML requests, so that's safe.
nova/nova/ api/openstack/ compute/ contrib/ security_ groups. py safe_minidom_ parse_string (which is safe), there is one call in _extend_servers that still uses minidom. parseString( req.body) and therefore looks vulnerable.
While most calls use xmlutil.
nova/nova/ api/openstack/ compute/ contrib/ security_ group_default_ rules.py
Uses pure minidom in its XML deserializer, so probably vulnerable.