You are viewing a plain text version of this content. The canonical link for it is here.
Posted to dev@tinkerpop.apache.org by "Sarang (Jira)" <ji...@apache.org> on 2021/08/17 18:31:00 UTC

[jira] [Commented] (TINKERPOP-2602) XML External Entity (XXE) vulnerability

    [ https://issues.apache.org/jira/browse/TINKERPOP-2602?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=17400559#comment-17400559 ] 

Sarang commented on TINKERPOP-2602:
-----------------------------------

Thanks Stephen for a quick response. When can I anticipate the maven artifact be available for general use for versions 3.4.13, 3.5.2, 3.6.0?

> XML External Entity (XXE) vulnerability
> ---------------------------------------
>
>                 Key: TINKERPOP-2602
>                 URL: https://issues.apache.org/jira/browse/TINKERPOP-2602
>             Project: TinkerPop
>          Issue Type: Bug
>          Components: structure
>    Affects Versions: 3.4.11
>         Environment: OpenJDK11, openjre-slim docker image
>            Reporter: Sarang
>            Priority: Major
>              Labels: None
>
> Found this from a security vulnerability scan. The following usage in gremlin-core package allows reading XML input stream and could potentially lead to XXE attack.
> In general, when XML input containing a reference to an external entity is processed by a weakly configured XML parser, it can lead to an XML external entity (XXE) attack.
> [https://github.com/apache/tinkerpop/blob/master/gremlin-core/src/main/java/org/apache/tinkerpop/gremlin/structure/io/graphml/GraphMLReader.java#L396]
> More details on the vulnerability: [https://owasp.org/www-community/vulnerabilities/XML_External_Entity_(XXE)_Processing]



--
This message was sent by Atlassian Jira
(v8.3.4#803005)