Skip to content

Document XML parser usage against security false positives #33713

Closed
@bclozel

Description

@bclozel

We received quite a few false positive CVE reports about XXE (XML external entity) attacks recently. This seems to be the result of code search and automated tools that look for SAXParserFactory, TransformerFactory or DocumentBuilderFactory usage, without considering usage or context.

in Spring Framework, all XML parsing of "user content" is done with the external entities support turned off by default. Other places are about internal application usage (such as parsing XML configuration) and does not qualify as privilege escalation.

We should add dedicated comments in the source code to prevent future invalid reports in this area.

Metadata

Metadata

Assignees

Labels

in: coreIssues in core modules (aop, beans, core, context, expression)type: documentationA documentation task

Type

No type

Projects

No projects

Milestone

Relationships

None yet

Development

No branches or pull requests

Issue actions