[ https://issues.apache.org/jira/browse/SLING-10852?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=17424549#comment-17424549 ]
Radu Cotescu commented on SLING-10852: -------------------------------------- This does not apply to the way we use {{esapi}} in the Apache Sling XSS Protection API bundle, but I have no issues to update the dependency to make any potential static scanners happier. > Upgrade OWASP and ESAPI Java libraries to 2.2.3.0 for vulnerability XML > External Entity (XXE) Injection > -------------------------------------------------------------------------------------------------------- > > Key: SLING-10852 > URL: https://issues.apache.org/jira/browse/SLING-10852 > Project: Sling > Issue Type: Improvement > Components: XSS Protection API > Reporter: Arun Kumar Ram > Assignee: Radu Cotescu > Priority: Major > Fix For: XSS Protection API 2.2.16 > > Time Spent: 20m > Remaining Estimate: 0h > > The {{esapi}} package is vulnerable to XML External Entity (XXE) attacks. The > {{loadPropertiesFromFile()}} method in the {{XmlEsapiPropertyLoader}} class > allows external entities to be defined in user-controlled XML input files > that can be used to configured the application. A remote attacker with > control over the input file used to configure the application may craft a > malicious XML file that could lead to Denial of Service (DoS), and in certain > circumstances Remote Code Execution (RCE) -- This message was sent by Atlassian Jira (v8.3.4#803005)