-
Notifications
You must be signed in to change notification settings - Fork 475
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Security: vulnerable to XXE attacks #869
Comments
This could be a problem for anyone who hosts a service where SVG's could be supplied by a third party. A malicious SVG doc could be used to retrieve file content from the host. Taking a peek at the code... Would that be too severe a solution? What was the original intention of the |
The
I don't think so. As @tebjan (the maintainer of the library) has already given his thumbs up, I see no problem with merging your PR. |
@mrbean-bremen thanks, can a new release be created? |
@tebjan - what do you think? |
Description
The library currently does not protect against XXE attacks.
e.g.
SvgDocument.DisableDtdProcessing
defaults to false, which leads to DTDs being accepted in general.But even when setting this to true, it is still possible to use
xrefs
to reach external resources.Please:
Example data
Used Versions
latest.
The text was updated successfully, but these errors were encountered: