XML External Entity Reference in Apache Sling
Critical severity
GitHub Reviewed
Published
May 17, 2022
to the GitHub Advisory Database
•
Updated Oct 11, 2023
Description
Published by the National Vulnerability Database
Jul 19, 2017
Published to the GitHub Advisory Database
May 17, 2022
Reviewed
Nov 3, 2022
Last updated
Oct 11, 2023
In the XSS Protection API module before 1.0.12 in Apache Sling, the method XSS.getValidXML() uses an insecure SAX parser to validate the input string, which allows for XXE attacks in all scripts which use this method to validate user input, potentially allowing an attacker to read sensitive data on the filesystem, perform same-site-request-forgery (SSRF), port-scanning behind the firewall or DoS the application.
References