[
https://issues.apache.org/jira/browse/SLING-10852?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel
]
Radu Cotescu updated SLING-10852:
---------------------------------
Description: The {{esapi}} package is vulnerable to XML External Entity
(XXE) attacks. The {{loadPropertiesFromFile()}} method in the
{{XmlEsapiPropertyLoader}} class allows external entities to be defined in
user-controlled XML input files that can be used to configured the application.
A remote attacker with control over the input file used to configure the
application may craft a malicious XML file that could lead to Denial of Service
(DoS), and in certain circumstances Remote Code Execution (RCE) (was: The
`_esapi_` package is vulnerable to XML External Entity (XXE) attacks. The
`_loadPropertiesFromFile()_` method in the `_XmlEsapiPropertyLoader_` class
allows external entities to be defined in user-controlled XML input files that
can be used to configured the application. A remote attacker with control over
the input file used to configure the application may craft a malicious XML file
that could lead to Denial of Service (DoS), and in certain circumstances Remote
Code Execution (RCE))
> Upgrade OWASP and ESAPI Java libraries to 2.2.3.0 for vulnerability XML
> External Entity (XXE) Injection
> --------------------------------------------------------------------------------------------------------
>
> Key: SLING-10852
> URL: https://issues.apache.org/jira/browse/SLING-10852
> Project: Sling
> Issue Type: Improvement
> Components: XSS Protection API
> Reporter: Arun Kumar Ram
> Assignee: Radu Cotescu
> Priority: Major
> Fix For: XSS Protection API 2.2.16
>
> Time Spent: 20m
> Remaining Estimate: 0h
>
> The {{esapi}} package is vulnerable to XML External Entity (XXE) attacks. The
> {{loadPropertiesFromFile()}} method in the {{XmlEsapiPropertyLoader}} class
> allows external entities to be defined in user-controlled XML input files
> that can be used to configured the application. A remote attacker with
> control over the input file used to configure the application may craft a
> malicious XML file that could lead to Denial of Service (DoS), and in certain
> circumstances Remote Code Execution (RCE)
--
This message was sent by Atlassian Jira
(v8.3.4#803005)