-
Notifications
You must be signed in to change notification settings - Fork 3k
Closed
Labels
bugIssue is reported as a bugIssue is reported as a bugteam:POAssigned to OTP team POAssigned to OTP team POteam:PSAssigned to OTP team PSAssigned to OTP team PS
Description
Hello,
xmerl is possibly the most mature XML parsing library in the Erlang ecosystem, but unfortunately it permits XXE vulnerabilities by default. Can this be disabled so everyone writing XML parsing code doesn't have to provide a custom fetch_fun for xmerl_scan or setting {allow_entities, False} to close the security hole?
This also affects some downstream consumers, including some wrappers for Elixir
alexgleason, mkljczk, Eriner, Dreamsndigital, matthieupeeters and 5 more
Metadata
Metadata
Assignees
Labels
bugIssue is reported as a bugIssue is reported as a bugteam:POAssigned to OTP team POAssigned to OTP team POteam:PSAssigned to OTP team PSAssigned to OTP team PS