[ 
https://issues.apache.org/jira/browse/DERBY-6807?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=14623946#comment-14623946
 ] 

Rick Hillegas commented on DERBY-6807:
--------------------------------------

Hi Bryan,

The secureXmlVTI.diff patch looks good to me. The XmlVTI is not part of the 
public API. Right now the only user of this VTI is the optimizerTracing 
optional tool. That tool is described on the Derby wiki but not in our Tools 
Guide. The optimizerTracing tool doesn't rely on the entity processing which 
your patch disables. So this patch should be safe. Thanks.

> XXE attack possible by using XmlVTI and the XML datatype
> --------------------------------------------------------
>
>                 Key: DERBY-6807
>                 URL: https://issues.apache.org/jira/browse/DERBY-6807
>             Project: Derby
>          Issue Type: Bug
>    Affects Versions: 10.11.1.1
>            Reporter: Rick Hillegas
>         Attachments: error-stacktrace.out, externalGeneralEntities.diff, 
> secureXmlVTI.diff, xmltest.diff
>
>
> The Derby XML datatype and XmlVTI can be exploited, via XXE-based attacks, to 
> expose sensitive information or launch denial-of-service assaults. This issue 
> has CVE id CVE-2015-1832. This issue was brought to our attention by Philippe 
> Arteau.



--
This message was sent by Atlassian JIRA
(v6.3.4#6332)

Reply via email to