Saikiran Boga created TINKERPOP-2589:
----------------------------------------

             Summary: XML External Entity (XXE) vulnerability
                 Key: TINKERPOP-2589
                 URL: https://issues.apache.org/jira/browse/TINKERPOP-2589
             Project: TinkerPop
          Issue Type: Bug
          Components: structure
            Reporter: Saikiran Boga


 

Found this from a security vulnerability scan. The following usage in 
gremlin-core package allows reading XML input stream and could potentially lead 
to XXE attack.

In general, when XML input containing a reference to an external entity is 
processed by a weakly configured XML parser, it can lead to an XML external 
entity (XXE) attack.

[https://github.com/apache/tinkerpop/blob/master/gremlin-core/src/main/java/org/apache/tinkerpop/gremlin/structure/io/graphml/GraphMLReader.java#L396]

More details on the vulnerability: 
[https://owasp.org/www-community/vulnerabilities/XML_External_Entity_(XXE)_Processing]

How to Fix: 
[https://cheatsheetseries.owasp.org/cheatsheets/XML_External_Entity_Prevention_Cheat_Sheet.html#xmlinputfactory-a-stax-parser]

 

Setting these properties on the XML factory should fix this:
{code:java}

inputFactory.setProperty(XMLInputFactory.IS_SUPPORTING_EXTERNAL_ENTITIES, 
false);
inputFactory.setProperty(XMLInputFactory.SUPPORT_DTD, false);

{code}



--
This message was sent by Atlassian Jira
(v8.3.4#803005)

Reply via email to