Skip to content

xmerl allows XXE by default #7539

@feld

Description

@feld

Hello,

xmerl is possibly the most mature XML parsing library in the Erlang ecosystem, but unfortunately it permits XXE vulnerabilities by default. Can this be disabled so everyone writing XML parsing code doesn't have to provide a custom fetch_fun for xmerl_scan or setting {allow_entities, False} to close the security hole?

This also affects some downstream consumers, including some wrappers for Elixir

https://vuln.be/post/xxe-in-erlang-and-elixir/

Metadata

Metadata

Labels

bugIssue is reported as a bugteam:POAssigned to OTP team POteam:PSAssigned to OTP team PS

Type

No type

Projects

No projects

Milestone

No milestone

Relationships

None yet

Development

No branches or pull requests

Issue actions