[
https://issues.apache.org/jira/browse/CXF-8245?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=17061972#comment-17061972
]
Tim Allison commented on CXF-8245:
----------------------------------
IIUC, we bring woodstox-core in as a dependency from cxf. I asked [~abchauha]
to push this upstream.
{noformat}
[INFO] | +- org.apache.cxf:cxf-core:jar:3.3.5:compile
[INFO] | | +- com.fasterxml.woodstox:woodstox-core:jar:5.0.3:compile
{noformat}
> Vulnerable "woodstox-core" is present inside Tika 1.23
> ------------------------------------------------------
>
> Key: CXF-8245
> URL: https://issues.apache.org/jira/browse/CXF-8245
> Project: CXF
> Issue Type: Bug
> Reporter: Abhishek Chauhan
> Priority: Major
>
> *Short Description:* woodstox-core is a transitive dependency of Apache
> Tika. Checked the pom inside tika-app-1.23.jar, it seems that it is
> internally using 5.0.3 version of woodstox-core, which is vulnerable.
> *Root Cause :* tika-app-1.23.jar; com/ctc/wstx/sax/WstxSAXParserFactory.class
> : [5.0.1 , 5.3.0]
> *Vulnerability*: The woodstox-core package is vulnerable to Improper
> Restriction ofXML eXternal Entity [XXE] Reference. The setFeature and
> getFeature methods in WstxSAXParserFactory.class rely on the
> mSecureProcessing boolean value to be able to securely parse input XML. The
> boolean value, however, is set to false by default. Additionally, the class
> lacks support for properties XMLConstants.FEATURE_SECURE_PROCESSING and
> XMLInputFactory.IS_SUPPORTING_EXTERNAL_ENTITIES, which can make it possible
> for an attacker to conduct XXE attacks.
> This vulnerability is addressed in the issue
> [https://github.com/FasterXML/woodstox/issues/61]
> *Solution of the Vulnerability*: Issue
> [https://github.com/FasterXML/woodstox/issues/61] is fixed in version 5.3.0
> of woodstox-core. Tika may need to upgrade the version of this dependency,
> so consumers are not affected by transitive dependency.
--
This message was sent by Atlassian Jira
(v8.3.4#803005)