XML parsing vulnerable to XXE for XPath
This product is not supported for your selected
Datadog site. (
).
이 페이지는 아직 영어로 제공되지 않습니다. 번역 작업 중입니다.
현재 번역 프로젝트에 대한 질문이나 피드백이 있으신 경우
언제든지 연락주시기 바랍니다.ID: java-security/xml-parsing-xxe-xpath
Language: Java
Severity: Warning
Category: Security
CWE: 611
Description
Your code may be vulnerable XML if you process XML from an untrusted source.
Make sure to enable secure processing when you process XML data by setting XMLConstants.FEATURE_SECURE_PROCESSING to true.
Learn More
Non-Compliant Code Examples
class MyClass {
public void test() {
DocumentBuilderFactory df = DocumentBuilderFactory.newInstance();
DocumentBuilder builder = df.newDocumentBuilder();
DocumentBuilder db2 = DocumentBuilderFactory.newInstance().newDocumentBuilder();
}
}
Compliant Code Examples
class MyClass {
public void test() {
DocumentBuilderFactory df = DocumentBuilderFactory.newInstance();
df.setFeature(XMLConstants.FEATURE_SECURE_PROCESSING, true);
DocumentBuilder builder = df.newDocumentBuilder();
}
}
원활한 통합. Datadog Code Security를 경험해 보세요