mirror of
https://github.com/github/codeql.git
synced 2025-12-24 04:36:35 +01:00
Document XXE sanitisation policy
This commit is contained in:
@@ -27,6 +27,11 @@ If this is not possible you should disable the parsing of external general entit
|
|||||||
This improves security but the code will still be at risk of denial of service and server side request forgery attacks.
|
This improves security but the code will still be at risk of denial of service and server side request forgery attacks.
|
||||||
Protection against denial of service attacks may also be implemented by setting entity expansion limits, which is done
|
Protection against denial of service attacks may also be implemented by setting entity expansion limits, which is done
|
||||||
by default in recent JDK and JRE implementations.
|
by default in recent JDK and JRE implementations.
|
||||||
|
|
||||||
|
Because there are many different ways to disable external entity retrieval with varying support between different providers,
|
||||||
|
in this query we choose to specifically check for the <a href="https://cheatsheetseries.owasp.org/cheatsheets/XML_External_Entity_Prevention_Cheat_Sheet.html#java">OWASP recommended way</a>
|
||||||
|
to disable external entity retrieval for a particular parser. There may be other ways of making a particular parser safe
|
||||||
|
which deviate from these guidelines, in which case this query will continue to flag the parser as potentially dangerous.
|
||||||
</p>
|
</p>
|
||||||
</recommendation>
|
</recommendation>
|
||||||
|
|
||||||
|
|||||||
Reference in New Issue
Block a user