- 필수 기능
- 시작하기
- Glossary
- 표준 속성
- Guides
- Agent
- 통합
- 개방형텔레메트리
- 개발자
- Administrator's Guide
- API
- Datadog Mobile App
- CoScreen
- Cloudcraft
- 앱 내
- 서비스 관리
- 인프라스트럭처
- 애플리케이션 성능
- APM
- Continuous Profiler
- 스팬 시각화
- 데이터 스트림 모니터링
- 데이터 작업 모니터링
- 디지털 경험
- 소프트웨어 제공
- 보안
- AI Observability
- 로그 관리
- 관리
ID: csharp-security/avoid-xml-xxe
Language: C#
Severity: Warning
Category: Security
CWE: 611
Enabling processing of external data can lead to XML External Entity (XXE) attacks. To prevent this, disable external processing or make sure the external processing you are using is safe. Note that this vulnerability is important for .NET Framework prior to 4.5.2, latest revision are safe by default.
using System.Xml;
class MyClass {
public static void payloadDecode()
{
XmlDocument parser = new XmlDocument();
parser.XmlResolver = new XmlUrlResolver();
parser.LoadXml("myDocument.xml");
}
}
using System.Xml;
class MyClass {
public static void payloadDecode()
{
XmlDocument parser = new XmlDocument();
parser.XmlResolver = null;
parser.LoadXml("myDocument.xml");
}
}
|
|
For more information, please read the Code Analysis documentation
Identify code vulnerabilities directly in yourVS Code editor
Identify code vulnerabilities directly inJetBrains products