[ 
https://issues.apache.org/jira/browse/SLING-10852?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel
 ]

Radu Cotescu updated SLING-10852:
---------------------------------
    Description: The {{esapi}} package is vulnerable to XML External Entity 
(XXE) attacks. The {{loadPropertiesFromFile()}} method in the 
{{XmlEsapiPropertyLoader}} class allows external entities to be defined in 
user-controlled XML input files that can be used to configured the application. 
A remote attacker with control over the input file used to configure the 
application may craft a malicious XML file that could lead to Denial of Service 
(DoS), and in certain circumstances Remote Code Execution (RCE)  (was: The 
`_esapi_` package is vulnerable to XML External Entity (XXE) attacks. The 
`_loadPropertiesFromFile()_` method in the `_XmlEsapiPropertyLoader_` class 
allows external entities to be defined in user-controlled XML input files that 
can be used to configured the application. A remote attacker with control over 
the input file used to configure the application may craft a malicious XML file 
that could lead to Denial of Service (DoS), and in certain circumstances Remote 
Code Execution (RCE))

> Upgrade  OWASP and ESAPI Java libraries to 2.2.3.0 for vulnerability XML 
> External Entity (XXE) Injection
> --------------------------------------------------------------------------------------------------------
>
>                 Key: SLING-10852
>                 URL: https://issues.apache.org/jira/browse/SLING-10852
>             Project: Sling
>          Issue Type: Improvement
>          Components: XSS Protection API
>            Reporter: Arun Kumar Ram
>            Assignee: Radu Cotescu
>            Priority: Major
>             Fix For: XSS Protection API 2.2.16
>
>          Time Spent: 20m
>  Remaining Estimate: 0h
>
> The {{esapi}} package is vulnerable to XML External Entity (XXE) attacks. The 
> {{loadPropertiesFromFile()}} method in the {{XmlEsapiPropertyLoader}} class 
> allows external entities to be defined in user-controlled XML input files 
> that can be used to configured the application. A remote attacker with 
> control over the input file used to configure the application may craft a 
> malicious XML file that could lead to Denial of Service (DoS), and in certain 
> circumstances Remote Code Execution (RCE)



--
This message was sent by Atlassian Jira
(v8.3.4#803005)

Reply via email to