Skip to content

Commit 4cf4159

Browse files
committed
Sync generated files ("make sync")
1 parent 8fadbf3 commit 4cf4159

1 file changed

Lines changed: 11 additions & 3 deletions

File tree

doc/xml-security/index.html

Lines changed: 11 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -105,13 +105,21 @@ <h1><a href="../../doc/xml-security/">XML Security</a></h1>
105105
</blockquote>
106106
<h1>Overview</h1>
107107
<ul>
108+
<li><a href="#external-entities">External entities (XXE)</a></li>
108109
<li><a href="#billion-laughs">Billion laughs attack</a></li>
109-
<li><a href="#external-entities">External entities</a></li>
110110
</ul>
111+
<h1><a name="external-entities"></a> External entities (XXE)</h1>
112+
<p>XML eXternal Entity (XXE) vulnerabilities are a common security problem in applications that parse XML
113+
files.</p>
114+
<p>XXE attacks rely on accessing files via <code>file://</code> URLs. Some variations (Blind XXE) also utilize access
115+
to remote URLs (e.g, <code>https://</code>, <code>ftp://</code>). By default, Expat does not access external URLs (both local
116+
and remote) and is, therefore, not affected by XXE.</p>
117+
<p>Expat only supports accessing URLs if a URL handler is configured via
118+
<a href="https://libexpat.github.io/doc/api/latest/#XML_SetExternalEntityRefHandler"><code>XML_SetExternalEntityRefHandler</code></a>.
119+
Configuring a URL handler is therefore risky and should not be done if untrusted XML input is
120+
expected.</p>
111121
<h1><a name="billion-laughs"></a> Billion laughs attack</h1>
112122
<p>TODO</p>
113-
<h1><a name="external-entities"></a> External entities</h1>
114-
<p>TODO</p>
115123
</div>
116124
</div>
117125

0 commit comments

Comments
 (0)