-
Notifications
You must be signed in to change notification settings - Fork 494
New issue
Have a question about this project? # for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “#”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? # to your account
XXE in Xml.java #931
Labels
Comments
conker84
added a commit
to conker84/neo4j-apoc-procedures
that referenced
this issue
Oct 25, 2018
jexp
pushed a commit
that referenced
this issue
May 23, 2019
jexp
pushed a commit
that referenced
this issue
May 29, 2019
conker84
pushed a commit
to conker84/neo4j-apoc-procedures
that referenced
this issue
May 29, 2019
…eo4j-contrib#1208) loading of xml files was previously forbidden (neo4j-contrib#931). With this change, an dummy entity resolver is registered that does nothing, e.g. does not load external files.
# for free
to join this conversation on GitHub.
Already have an account?
# to comment
The Issue
An XML External Entity attack is a type of attack against an application that parses XML input. This attack occurs when XML input containing a reference to an external entity is processed by a weakly configured XML parser. This attack may lead to the disclosure of confidential data, denial of service, server side request forgery, port scanning from the perspective of the machine where the parser is located, and other system impacts.
Where the Issue Occurred
The following code snippets display the usage of
DocumentBuilderFactory
without securely disabling entities:neo4j-apoc-procedures/src/main/java/apoc/load/Xml.java
Line 74 in 591f8ed
The text was updated successfully, but these errors were encountered: