Improper Restriction of XML External Entity Reference

Property
Languagejava
Severityhigh
CWECWE-611: Improper Restriction of XML External Entity Reference
OWASPA04:2017 - XML External Entities (XXE)
Confidence LevelHigh
Impact LevelHigh
Likelihood LevelLow

Description

The code allows XML documents to include DOCTYPE declarations without disabling external entity processing. This means XML parsers can load external resources defined in the XML, which is insecure.

Impact

If exploited, an attacker could use XML External Entity (XXE) attacks to read sensitive files from the server, perform denial-of-service (DoS), or make network requests to internal resources, potentially exposing confidential data and compromising system integrity.

Improper Restriction of XML External Entity Reference

Property
Languagejavascript
Severitymedium
CWECWE-611: Improper Restriction of XML External Entity Reference
OWASPA04:2017 - XML External Entities (XXE)
Confidence LevelMedium
Impact LevelMedium
Likelihood LevelMedium

Description

The application passes user-supplied data directly to the XML parser (using node-expat) without proper validation or sanitization. This can allow attackers to craft malicious XML that the parser processes unsafely.

Impact

If exploited, attackers could read sensitive files from your server, access internal resources, or trigger denial of service by abusing XML External Entity (XXE) processing. This can lead to data breaches, information leakage, or service disruption.

Improper Restriction of XML External Entity Reference

Property
Languagejavascript
Severitymedium
CWECWE-611: Improper Restriction of XML External Entity Reference
OWASPA04:2017 - XML External Entities (XXE)
Confidence LevelMedium
Impact LevelMedium
Likelihood LevelMedium

Description

User-supplied data is being passed directly to the xml2json XML parser in your Express application without proper validation or sanitization. This can allow attackers to inject malicious XML content, leading to XML External Entity (XXE) vulnerabilities.

Impact

If exploited, attackers could read sensitive files from your server, perform server-side request forgery (SSRF), or cause denial of service. This could expose confidential information, compromise server integrity, or be used as a foothold for further attacks against your application or infrastructure.

Improper Restriction of XML External Entity Reference

Property
Languagejavascript
Severityhigh
CWECWE-611: Improper Restriction of XML External Entity Reference
OWASPA04:2017 - XML External Entities (XXE)
Confidence LevelMedium
Impact LevelHigh
Likelihood LevelMedium

Description

User-supplied data is being parsed as XML by the xml2json library within an Express route handler without validation. This can allow attackers to craft malicious XML input that is processed by your server.

Impact

If exploited, attackers could read sensitive files from your server, perform server-side request forgery (SSRF), or cause denial of service. This can lead to data breaches, unauthorized access, or disruption of service, putting your application and its users at significant risk.

Improper Restriction of XML External Entity Reference

Property
Languagejavascript
Severitymedium
CWECWE-611: Improper Restriction of XML External Entity Reference
OWASPA04:2017 - XML External Entities (XXE)
Confidence LevelLow
Impact LevelHigh
Likelihood LevelLow

Description

The parseXml() function is being used with the ’noent’ option set to true, which allows external entities in XML to be processed. If untrusted or user-supplied XML data is parsed this way, it can expose the application to XML External Entity (XXE) attacks.

Improper Restriction of XML External Entity Reference

Property
Languagejavascript
Severitylow
CWECWE-611: Improper Restriction of XML External Entity Reference
OWASPA04:2017 - XML External Entities (XXE)
Confidence LevelLow
Impact LevelLow
Likelihood LevelLow

Description

Untrusted user input is being passed directly to the xml2json XML parser without validation or sanitization, which can allow processing of dangerous XML content. This makes the application vulnerable to XML External Entity (XXE) attacks.

Impact

If exploited, an attacker could access sensitive files on the server, perform server-side request forgery (SSRF), or disrupt application behavior by injecting malicious XML. This can lead to data leaks, unauthorized access, or compromise of backend systems.

Improper Restriction of XML External Entity Reference

Property
Languagejavascript
Severitylow
CWECWE-611: Improper Restriction of XML External Entity Reference
OWASPA04:2017 - XML External Entities (XXE)
Confidence LevelLow
Impact LevelLow
Likelihood LevelLow

Description

Handling the ‘ondoctype’ event in the ‘sax’ XML parser can introduce XML External Entity (XXE) vulnerabilities if external entities are processed from untrusted sources. This can happen if custom DTD entity definitions are implemented without proper security controls.

Improper Restriction of XML External Entity Reference

Property
Languagejavascript
Severitylow
CWECWE-611: Improper Restriction of XML External Entity Reference
OWASPA04:2017 - XML External Entities (XXE)
Confidence LevelLow
Impact LevelMedium
Likelihood LevelLow

Description

Parsing XML input from users with the ’node-expat’ library without proper validation or disabling external entities can expose your code to XML External Entity (XXE) attacks. This happens when untrusted XML data is processed without restrictions.

Impact

If exploited, attackers could read sensitive files from your server, perform server-side request forgery (SSRF), or potentially execute denial-of-service attacks. This can lead to data breaches, unauthorized access to internal resources, and compromise of the application’s security.

Improper Restriction of XML External Entity Reference

Property
Languagepython
Severitymedium
CWECWE-611: Improper Restriction of XML External Entity Reference
OWASPA04:2017 - XML External Entities (XXE)
Confidence LevelMedium
Impact LevelMedium
Likelihood LevelLow

Description

Parsing untrusted XML data using Python’s built-in xml library can expose your application to XML External Entity (XXE) attacks. This occurs because the default parser does not securely handle external entities, making it unsafe for untrusted input.

Impact

If exploited, attackers could read sensitive files from your server, perform server-side request forgery (SSRF), or trigger denial-of-service attacks with malicious XML payloads. This can lead to data breaches, system downtime, and compromise of internal systems.