[ 
https://issues.apache.org/jira/browse/FREEMARKER-191?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=17421955#comment-17421955
 ] 

Dániel Dékány commented on FREEMARKER-191:
------------------------------------------

Do you have any more comments on this, or can this be closed? Especially as 
this is or was a suspected security issue, we should have a closure here. At 
least we should be able to state that it's not exploitable currently.

> The class TaglibFactory.class may have XXE security issue
> ---------------------------------------------------------
>
>                 Key: FREEMARKER-191
>                 URL: https://issues.apache.org/jira/browse/FREEMARKER-191
>             Project: Apache Freemarker
>          Issue Type: Bug
>          Components: engine, jsp
>    Affects Versions: 2.3.31
>            Reporter: PowerCOM_STARWAR
>            Priority: Major
>         Attachments: TaglibFactory.java
>
>
> In the class  TaglibFactory, it provides the static method "parseXml" to 
> parse the inputstream,  but it does not set security head,for example as 
> below:
> xmlReader.setFeature("http://apache.org/xml/features/disallow-doctype-decl";, 
> true);
>  
> xmlReader.setFeature("http://xml.org/sax/features/external-parameter-entities";,
>  false);
>  
> xmlReader.setFeature("http://xml.org/sax/features/external-general-entities";, 
> false); 
> and then it may be attacked by XXE. So i think freemarker can add the above 
> content first and parse the xml on next step, it will be better. Thanks



--
This message was sent by Atlassian Jira
(v8.3.4#803005)

Reply via email to