XML parsing vulnerable to XEE
This product is not supported for your selected
Datadog site. (
).
이 페이지는 아직 영어로 제공되지 않습니다. 번역 작업 중입니다.
현재 번역 프로젝트에 대한 질문이나 피드백이 있으신 경우
언제든지 연락주시기 바랍니다.ID: java-security/xml-parsing-xee
Language: Java
Severity: Notice
Category: Security
CWE: 611
Description
Systems may be vulnerable to an XML External Entity attack when they process XML from untrusted sources.
Learn More
Non-Compliant Code Examples
public class TestClass {
public void parseXML(InputStream input) throws XMLStreamException {
XMLInputFactory factory = XMLInputFactory.newFactory();
factory.setProperty("aproperty", false);
XMLStreamReader reader = factory.createXMLStreamReader(input);
factory.setProperty("anotherproperty", false);
}
}
Compliant Code Examples
public class TestClass {
public void parseXML(InputStream input) throws XMLStreamException {
XMLInputFactory factory = XMLInputFactory.newFactory();
factory.setProperty("aproperty", false);
factory.setProperty(XMLInputFactory.SUPPORT_DTD, false);
factory.setProperty("anotherproperty", false);
XMLStreamReader reader = factory.createXMLStreamReader(input);
}
}
public class TestClass {
public void parseXML(InputStream input) throws XMLStreamException {
XMLInputFactory factory = XMLInputFactory.newFactory();
factory.setProperty("aproperty", false);
factory.setProperty(XMLInputFactory.IS_SUPPORTING_EXTERNAL_ENTITIES, false);
factory.setProperty("anotherproperty", false);
XMLStreamReader reader = factory.createXMLStreamReader(input);
}
}
원활한 통합. Datadog Code Security를 경험해 보세요