Skip to content

Conversation

@th555555
Copy link

Summary
This PR addresses a critical XXE (XML External Entity) vulnerability in the factory() method which creates an insecure SAXParserFactory without proper security configurations.

Description
The current implementation creates an XML parser that is vulnerable to XXE attacks. The parser is configured to validate XML documents and be namespace aware, but lacks critical security features that prevent malicious XML inputs from accessing local files, making network connections, or causing denial of service.

References
itsallcode/openfasttrace@3078109 https://nvd.nist.gov/vuln/detail/CVE-2018-12022

th555555 added 2 commits May 20, 2025 17:27
Summary
This PR addresses a critical XXE (XML External Entity) vulnerability in the factory() method which creates an insecure SAXParserFactory without proper security configurations.

Description
The current implementation creates an XML parser that is vulnerable to XXE attacks. The parser is configured to validate XML documents and be namespace aware, but lacks critical security features that prevent malicious XML inputs from accessing local files, making network connections, or causing denial of service.

References
itsallcode/openfasttrace@3078109
https://nvd.nist.gov/vuln/detail/CVE-2018-12022
Summary
This PR addresses a security vulnerability in the forName method where classes are loaded using the potentially untrusted thread context classloader instead of a specific trusted classloader.

Description
In untrusted environments, this classloader could be manipulated to load malicious classes. This change uses a specific trusted class's classloader instead, similar to the approach used in other secure parts of the codebase.

References
https://nvd.nist.gov/vuln/detail/cve-2022-22965
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

1 participant