XXE vulnerability
seanboylan opened this issue · 2 comments
seanboylan commented
ezvcard.util.XMLUtils
private static Document toDocument(InputSource in) throws SAXException, IOException {
DocumentBuilderFactory factory = DocumentBuilderFactory.newInstance();
factory.setNamespaceAware(true);
factory.setIgnoringComments(true);
DocumentBuilder builder;
try {
builder = factory.newDocumentBuilder();
} catch (ParserConfigurationException e) {
//should never be thrown because we're not doing anything fancy with the configuration
throw new RuntimeException(e);
}
return builder.parse(in);
}
Has an XXE vulnerability - Please dsiable External xml entity processing:
References:
https://www.owasp.org/index.php/XML_External_Entity_%28XXE%29_Prevention_Cheat_Sheet
https://www.owasp.org/index.php/XML_External_Entity_%28XXE%29_Processing
mangstadt commented
Thank you for reporting this, Sean. I will look into it.