[
https://issues.apache.org/jira/browse/WW-5621?focusedWorklogId=1012027&page=com.atlassian.jira.plugin.system.issuetabpanels:worklog-tabpanel#worklog-1012027
]
ASF GitHub Bot logged work on WW-5621:
--------------------------------------
Author: ASF GitHub Bot
Created on: 29/Mar/26 06:25
Start Date: 29/Mar/26 06:25
Worklog Time Spent: 10m
Work Description: sonarqubecloud[bot] commented on PR #1643:
URL: https://github.com/apache/struts/pull/1643#issuecomment-4149546974
## [](https://sonarcloud.io/dashboard?id=apache_struts&pullRequest=1643)
**Quality Gate failed**
Failed conditions
 [25 Security
Hotspots](https://sonarcloud.io/project/security_hotspots?id=apache_struts&pullRequest=1643&issueStatuses=OPEN,CONFIRMED&sinceLeakPeriod=true)
 [43.3% Coverage on New
Code](https://sonarcloud.io/component_measures?id=apache_struts&pullRequest=1643&metric=new_coverage&view=list)
(required ≥ 80%)
 [3.3% Duplication on New
Code](https://sonarcloud.io/component_measures?id=apache_struts&pullRequest=1643&metric=new_duplicated_lines_density&view=list)
(required ≤ 3%)
 [E Security Rating on New
Code](https://sonarcloud.io/dashboard?id=apache_struts&pullRequest=1643)
(required ≥ A)
 [E Reliability Rating on New
Code](https://sonarcloud.io/dashboard?id=apache_struts&pullRequest=1643)
(required ≥ A)
[See analysis details on SonarQube
Cloud](https://sonarcloud.io/dashboard?id=apache_struts&pullRequest=1643)
##
 Catch issues before they fail your Quality Gate with our IDE extension
 [SonarQube for
IDE](https://www.sonarsource.com/products/sonarlint/features/connected-mode/?referrer=pull-request)
Issue Time Tracking
-------------------
Worklog Id: (was: 1012027)
Time Spent: 1h (was: 50m)
> Harden XML parsers against Entity Expansion (Billion Laughs) attacks
> --------------------------------------------------------------------
>
> Key: WW-5621
> URL: https://issues.apache.org/jira/browse/WW-5621
> Project: Struts 2
> Issue Type: Improvement
> Components: Plugin - XSLT
> Reporter: Lukasz Lenart
> Assignee: Lukasz Lenart
> Priority: Minor
> Fix For: 6.9.0, 7.2.0
>
> Time Spent: 1h
> Remaining Estimate: 0h
>
> Defense-in-depth hardening of XML parsers. Modern JDKs (7u45+) already
> enforce a 64K entity expansion limit, so this is not an exploitable
> vulnerability — all XML sources come from the classpath, not user input.
> Changes:
> - Remove unused {{parseStringAsXML}} feature from {{StringAdapter}} to
> eliminate theoretical attack surface
> - Deprecate {{getParseStringAsXML()}} / {{setParseStringAsXML()}} for
> future removal
> - Enable {{FEATURE_SECURE_PROCESSING}} in Tiles
> {{DigesterDefinitionsReader}}
> - Add unit test verifying JDK entity expansion limit rejects Billion Laughs
> payloads
--
This message was sent by Atlassian Jira
(v8.20.10#820010)