Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Message-ID: <nd3k26$2sr$1@ger.gmane.org>
Date: Fri, 25 Mar 2016 16:04:38 +0100
From: Jörg Schaible <joerg.schaible@....de>
To: oss-security@...ts.openwall.com
Subject: CVE request - XStream: XXE vulnerability

Hi all,

XStream (x-stream.github.io) is a Java library to marshal Java objects into 
XML and back. For this purpose it supports a lot of different XML parsers. 
Some of those can also process external entities which was enabled by 
default.

An attacker could therefore provide manipulated XML as input to access data 
on the file system, see 
https://www.owasp.org/index.php/XML_External_Entity_(XXE)_Processing

Since XStream 1.4.9 all parsers are configured to ignore external entities 
by default as far as such behavior is configurable:
http://x-stream.github.io/changes.html#1.4.9

Luckily XStream's default parser Xpp3 does not parse entities at all. 
However, all application that use XStream >= 1.4.8 explicitly with parsers 
based on StAX, W3C DOM, Dom4J, JDOM or JDOM2 were affected unless the 
parsers had been properly configured manually.

Applications using XOM or explicitly BEA's old StAX reference parser are 
still vulnerable, we found no way to deactivate processing of external 
entities for those two.

Regards,
Jörg

On behalf of the XStream community

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.