You are viewing a plain text version of this content. The canonical link for it is here.
Posted to derby-dev@db.apache.org by "Bryan Pendleton (JIRA)" <ji...@apache.org> on 2015/07/11 18:33:04 UTC

[jira] [Commented] (DERBY-6807) XXE attack possible by using XmlVTI and the XML datatype

    [ https://issues.apache.org/jira/browse/DERBY-6807?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=14623476#comment-14623476 ] 

Bryan Pendleton commented on DERBY-6807:
----------------------------------------

Is XmlVTI documented anywhere in our public documentation? I'm not sure if any documentation changes are needed here. Perhaps there is Javadoc that I should update...?

> XXE attack possible by using XmlVTI and the XML datatype
> --------------------------------------------------------
>
>                 Key: DERBY-6807
>                 URL: https://issues.apache.org/jira/browse/DERBY-6807
>             Project: Derby
>          Issue Type: Bug
>    Affects Versions: 10.11.1.1
>            Reporter: Rick Hillegas
>         Attachments: error-stacktrace.out, externalGeneralEntities.diff, secureXmlVTI.diff, xmltest.diff
>
>
> The Derby XML datatype and XmlVTI can be exploited, via XXE-based attacks, to expose sensitive information or launch denial-of-service assaults. This issue has CVE id CVE-2015-1832. This issue was brought to our attention by Philippe Arteau.



--
This message was sent by Atlassian JIRA
(v6.3.4#6332)