Uploaded image for project: 'Spring Framework'
  1. Spring Framework
  2. SPR-13136

XML input vulnerability based on DTD declaration

    Details

    • Type: Bug
    • Status: Closed
    • Priority: Major
    • Resolution: Complete
    • Affects Version/s: None
    • Fix Version/s: 3.2.14, 4.1.7, 4.2 RC2
    • Component/s: OXM, Web
    • Security Level: Public
    • Labels:
      None
    • Last commented by a User:
      false

      Description

      If DTD is not entirely disabled, inline DTD declarations can be used to perform Denial of Service attacks known as XML bombs. Such declarations are both well-formed and valid according to XML schema rules but when parsed can cause out of memory errors. To protect against this kind of attack DTD support must be disabled by setting the disallow-doctype-dec feature in the DOM and SAX APIs to true and by setting the supportDTD property in the StAX API to false.

        Issue Links

          Activity

          Transition Time In Source Status Execution Times Last Executer Last Execution Date
          Open Open Resolved Resolved
          13d 12h 40m 1 Rossen Stoyanchev 30/Jun/15 6:27 AM
          Closed Closed Reopened Reopened
          1h 1 Rossen Stoyanchev 30/Jun/15 11:42 AM
          Reopened Reopened Resolved Resolved
          14s 1 Rossen Stoyanchev 30/Jun/15 11:42 AM
          Resolved Resolved Closed Closed
          4h 13m 2 Rossen Stoyanchev 30/Jun/15 11:42 AM

            People

            • Assignee:
              rstoya05-aop Rossen Stoyanchev
              Reporter:
              making Toshiaki Maki
              Last updater:
              Juergen Hoeller
            • Votes:
              0 Vote for this issue
              Watchers:
              5 Start watching this issue

              Dates

              • Created:
                Updated:
                Resolved:
                Days since last comment:
                2 years, 29 weeks, 1 day ago