[ 
https://issues.apache.org/jira/browse/DERBY-6810?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=14581364#comment-14581364
 ] 

Bryan Pendleton commented on DERBY-6810:
----------------------------------------

This page, which discusses non-Java XML processing:

https://msdn.microsoft.com/en-us/magazine/ee335713.aspx

suggests:

    The easiest way to defend against all types of XML entity attacks 
    is to simply disable altogether the use of inline DTD schemas in 
    your XML parsing objects. This is a straightforward application 
    of the principle of attack surface reduction: if you’re not using a 
    feature, turn it off so that attackers won’t be able to abuse it.

> Add regression tests for XXE vulnerability
> ------------------------------------------
>
>                 Key: DERBY-6810
>                 URL: https://issues.apache.org/jira/browse/DERBY-6810
>             Project: Derby
>          Issue Type: Sub-task
>            Reporter: Bryan Pendleton
>            Assignee: Abhinav Gupta
>         Attachments: billionLaughs.diff, readPasswordFile.diff
>
>
> We should add some regression tests demonstrating that
> Derby is no longer vulnerable to an XXE assault.
> One possibility would be to have a example using a local
> file disclosure.
> Another possibility would be to have example based on the
> well-known "Billion Laughs" denial of service attack.



--
This message was sent by Atlassian JIRA
(v6.3.4#6332)

Reply via email to