XML parsing vulnerable to XXE for SAX Parsers This product is not supported for your selected
Datadog site . (
).
Cette page n'est pas encore disponible en français, sa traduction est en cours.
Si vous avez des questions ou des retours sur notre projet de traduction actuel,
n'hésitez pas à nous contacter .
TRY THIS RULE ID: java-security/xml-parsing-xxe-saxparser
Language: Java
Severity: Warning
Category: Security
CWE : 611
Description Your code may be vulnerable XML if you process XML from an untrusted source.
Make sure to enable secure processing when you process XML data by setting XMLConstants.FEATURE_SECURE_PROCESSING
to true.
Learn More Non-Compliant Code Examples class MyClass {
public void test () {
SAXParser parser = SAXParserFactory . newInstance (). newSAXParser ();
parser . parse ( inputStream , customHandler );
SAXParserFactory spf2 = SAXParserFactory . newInstance ();
SAXParser parser = spf2 . newSAXParser ();
}
}
Compliant Code Examples class MyClass {
public void test () {
SAXParserFactory spf = SAXParserFactory . newInstance ();
spf . setFeature ( XMLConstants . FEATURE_SECURE_PROCESSING , true );
SAXParser parser = spf . newSAXParser ();
}
}
Seamless integrations. Try Datadog Code Security