-
Notifications
You must be signed in to change notification settings - Fork 228
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
XXE vulnerability #25
Comments
XStream supports a big number of XML parsers. Its default is Xpp3 which does not support entities at all. So what parser did you use? |
As far as possible I've turned off processing of external entities for all affected parsers. |
Ported into 1.4.x branch. |
I am using xstream-1.3.1 version. Is the "turn off on external entities" implemented in this version? |
No. That version is 7 years old and the 1.3.x line is no longer maintained. |
Thanks joehni for your quick response. I will plan on upgrading the to the latest version. In the mean time, I downloaded the latest source code of 1.4.8. Can you point me what class/method addresses the fix "disallow-doctype-decl" as pointed out in URL https://www.owasp.org/index.php/XML_External_Entity_(XXE)_Processing String FEATURE = "http://apache.org/xml/features/disallow-doctype-decl"; |
Hi, it's unfortunately not yet released. It's a series of commits. Look into the history of the 1.4.x branch in October 2015. |
Hello @joehni , Is xstream-1.4.3 vulnerable to this issue? |
Look at the milestone of this issue. |
Hello, A little question/remark: the threat is reported here: https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2016-3674. You can notice that:
so the product vendor here is "x-stream". But now (I can see it here http://mvnrepository.com/artifact/xstream/xstream) the vendor for current version is "com.thoughtworks.xstream" so in my opinion, CVE is not correctly reported for the moment. For example, if you use tools like OWASP dependency check (or maybe blackduck), you won't be able to detect that the lib is sensitive to potential threat. Do you think it's possible to contact NIST to update/add the new vendor to CPE (very sorry, I'm NOT (sorry) aware how to do that/if it's possible...)? Adrien |
Hi, |
DTD processing was enabled and therefore, XML deserialization process was vulnerable to XML External Entity Injection (I was able to expose local files).
https://www.owasp.org/index.php/XML_External_Entity_(XXE)_Processing
Suggestion is to ignore client-side DOCTYPE declarations.
The text was updated successfully, but these errors were encountered: