-
-
Notifications
You must be signed in to change notification settings - Fork 12
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
[SECURITY] advisories/GHSA-mjr4-7xg5-pfvh for optional dependency libxmljs2
#1061
Comments
I do not think so, see: See advisory: GHSA-mjr4-7xg5-pfvh |
you approach with no info, just drop a link to some outdated code from Apr 19, 2023
|
@jkowalleck is totally right. Perhaps this issue should be moved to the other @CycloneDX package, but since this is the initiator.
|
to make this happen, we need an non-vulnerable release of |
It seems that the author is not intended to work on this package. See for example in his comments:
Knowing that, it makes sense to think in a replacement of the package. May be: |
@artola could you craft any POC to showcase that the vulnerability affects this cyclonedx-javascript-library at all? |
|
libxmljs2
- advisories/GHSA-mjr4-7xg5-pfvh
libxmljs2
- advisories/GHSA-mjr4-7xg5-pfvhlibxmljs2
the library it is used only here:
current view on the problem:
to be researched: is any of the vulnerable code actually run? results: a XXE injection was possible in the current implementation of the Xml validator. |
@jkowalleck The problem with "optional dependency" is that you can opt-out for all of them, there is no way to select only some of them. I did try to introduce the malformed code using this example: I am not able to do it, if I do now know a deep nested child that is not sanitized (May be hashes?). Anyway, our concern is to have an alert saying that a high severity vulnerability could be introduced by this package and very difficult to determine the impact without knowing the usage. |
Signed-off-by: Jan Kowalleck <[email protected]>
expected to be fixed via #1063 (comment) |
prevent the XmlValidation from XXE parsing - prevent XML external entity (XXE) injection This is considered a security measure. fixes #1061 as described here: #1063 (comment) --------- Signed-off-by: Jan Kowalleck <[email protected]>
@jkowalleck was it a typo in this line? I mean it seems that if was intended to avoid entities.
fixed in:
But in the docs it mentions as noent: https://github.com/marudor/libxmljs2/wiki
|
nope. this was not a typo.
|
background: the the https://github.com/marudor/libxmljs2/blob/9b4260760c338c1a393ab61c4ad14e8710c598b2/index.d.ts#L11 |
I was wrong. This library was not affected by XXE in the first place. |
) ## Changed * The provided XML validation capabilities are hardened (via [#1064]; concerns [#1061]) This is considered a security measure concerning XML external entity (XXE) injection. [#1061]: #1061 [#1064]: #1064 ---- This is not an actual change. Per default, the XML validation capabilities were already secure in the intended ways. This is to prevent the fuckup like in the yanked v6.7.0 --------- Signed-off-by: Jan Kowalleck <[email protected]>
for the record, see also GHSA-38gf-rh2w-gmj7 |
some final words: the mentioned fundamental security issue in one of our dependencies actually is a provided feature, that, IF it was used wrong, COULD potentially cause issues. Lines 70 to 95 in 5d58e0f
the dependency in question might be replaced via #1079 -- feel free to contribute 🚀 |
documentation of exploitability is planned to be published. see #1183 |
https://github.com/CycloneDX/cyclonedx-javascript-library/pull/668/files#r1171603405
The text was updated successfully, but these errors were encountered: