Hi all,

while working with org.geotools.wfs.GML, we have found that an application 
using this utility class to decode XML files might open itself up to an XML 
external entity (XXE) vulnerability.

Is it possible to control the underlying XML parser in some way to disable 
external entity and DTD processing to close this vulnerability?

The way it currently works it would seem to me that org.geotools.wfs.GML should 
rather not be used in applications that accept data from 3rd parties. Since GML 
in turn uses org.geotools.xsd.Parser, I believe that more such vulnerabilities 
may exist in geotools.

If you are interested in the specifics, I can provide an example file and a 
small test class to demonstrate the vulnerability against gt-xsd-wfs 24.2, 
which I did not want to post on a public mailing list yet.

You can find general information on XXE vulnerabilities at 
https://owasp.org/www-project-top-ten/2017/A4_2017-XML_External_Entities_(XXE)

Kind regards,
Thorsten



_______________________________________________
GeoTools-Devel mailing list
GeoTools-Devel@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/geotools-devel

Reply via email to