nts0n opened a new issue, #15602:
URL: https://github.com/apache/lucene/issues/15602

   ### Description
   
   After reviewing the latest Apache Lucene source code (version 10.3.2), in 
DOMUtils.java, line 197, the application parses XML documents using a DOM 
parser without explicitly disabling external entity references. This insecure 
configuration may allow XML External Entity (XXE) attacks if user-controlled 
XML input is processed.
   
   <img width="928" height="802" alt="Image" 
src="https://github.com/user-attachments/assets/4f53f3d2-14ae-4fc2-ba0d-c2ff69e11956";
 />
   
   A sample test case was implemented using the loadXML function to evaluate 
XXE behavior. The function processed a malicious XML payload containing an 
external entity, resulting in the disclosure of the referenced local file 
contents.
   
   <img width="1139" height="512" alt="Image" 
src="https://github.com/user-attachments/assets/7906a665-3e2d-40e5-bee1-6ec95e509d66";
 />
   
   <img width="1124" height="167" alt="Image" 
src="https://github.com/user-attachments/assets/fd396a9d-7de3-475a-9dd9-b079771d5091";
 />
   
   ### Version and environment details
   
   _No response_


-- 
This is an automated message from the Apache Git Service.
To respond to the message, please log on to GitHub and use the
URL above to go to the specific comment.

To unsubscribe, e-mail: [email protected]

For queries about this service, please contact Infrastructure at:
[email protected]


---------------------------------------------------------------------
To unsubscribe, e-mail: [email protected]
For additional commands, e-mail: [email protected]

Reply via email to