-
Notifications
You must be signed in to change notification settings - Fork 64
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
XXE Vulnerability due to simple-xml? #30
Comments
No comment? |
Puh, sorry, I do not have very much free time to spend on Cups4j. |
I had a quick look into cups4j. Apparently, simple-xml is only used to parse configuration files supplied by cups4j itself, loaded via classpath. However, given the lack of feedback from the author of simple-xml, I'd suggest to ditch that library in favor of jaxb or maybe jackson. At least, consider switching to the fork in https://github.com/carrotsearch/simplexml-safe |
I think the reason why xml is used is because the code is based on old "ch.ethz" code that was created when xml was hyped. there is actually no need to use xml in the first place. ipp is binary encoded and a decent object representation can be created without intermediate xml representations. |
Accoding to ngallagher/simplexml#18 there is an XXE vulnerability in simple-xml, which is used by cups4j.
So in my understanding, a malicious printer or MITM could exploit cup4j Users.
Can you clarify on the subject? Does cups4j mitigate against such attacks by controlling the underlying XML Parsers, as is for example implemented in https://github.com/carrotsearch/simplexml-safe?
The text was updated successfully, but these errors were encountered: