[ 
https://issues.apache.org/jira/browse/XALANJ-2435?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel
 ]

Gary Gregory resolved XALANJ-2435.
----------------------------------

       Resolution: Fixed
    Fix Version/s: 2.7.2
         Assignee: Gary Gregory

http://www.ocert.org/advisories/ocert-2014-002.html

Fixed in SVN branch 
https://svn.apache.org/repos/asf/xalan/java/branches/xalan-j_2_7_1_maint

> Use of secure processing feature should disable some output properties
> ----------------------------------------------------------------------
>
>                 Key: XALANJ-2435
>                 URL: https://issues.apache.org/jira/browse/XALANJ-2435
>             Project: XalanJ2
>          Issue Type: Bug
>    Affects Versions: 2.7.1
>            Reporter: Steve Jones
>            Assignee: Gary Gregory
>             Fix For: 2.7.2
>
>         Attachments: TestXslt.java
>
>
> When using the FEATURE_SECURE_PROCESSING 
> ("http://javax.xml.XMLConstants/feature/secure-processing";) on a 
> TransformerFactory it seems appropriate that the output properties:
>   {http://xml.apache.org/xalan}content-handler 
>   {http://xml.apache.org/xalan}entities
>   {http://xml.apache.org/xslt}content-handler 
>   {http://xml.apache.org/xslt}entities
> should be ignored (see 
> http://xml.apache.org/xalan-j/usagepatterns.html#outputprops)
> These properties can be used to load an arbitrary class or access an 
> arbitrary URL/resource so are problematic when secure processing is desired.
>    <xsl:output xalan:content-handler="org.example.BadClass" ...
>    <xsl:output xalan:entities="http://example.org/reallyLargeFile.bin"; ...
> These features could be used to load a class that had undesirable 
> side-effects or to load a large file and exhaust memory, etc.



--
This message was sent by Atlassian JIRA
(v6.2#6252)

---------------------------------------------------------------------
To unsubscribe, e-mail: [email protected]
For additional commands, e-mail: [email protected]

Reply via email to