@@ -109,14 +109,14 @@ <h1>Overview</h1>
109109< li > < a href ="#billion-laughs "> Billion laughs attack</ a > </ li >
110110</ ul >
111111< h1 > < a name ="external-entities "> </ a > External entities (XXE)</ h1 >
112- < p > XML eXternal Entity (XXE) vulnerabilities are a common security problem in applications that parse XML
113- files.</ p >
114- < p > XXE attacks rely on accessing files via < code > file://</ code > URLs. Some variations (Blind XXE) also utilize access
115- to remote URLs (e.g, < code > https:// </ code > , < code > ftp:// </ code > ). By default, Expat does not access external URLs (both local
116- and remote) and is, therefore, not affected by XXE.</ p >
117- < p > Expat only supports accessing URLs if a URL handler is configured via
112+ < p > < a href =" https://en.wikipedia.org/wiki/XML_external_entity_attack " > < strong > X </ strong > ML e < strong > X </ strong > ternal < strong > E </ strong > ntity (XXE) vulnerabilities</ a >
113+ are a common security problem in applications that parse XML files.</ p >
114+ < p > XXE attacks rely on accessing files via < code > file://</ code > , < code > https:// </ code > , < code > ftp:// </ code > or relative URLs.
115+ By default, Expat does not access external URLs — neither local nor remote — and is,
116+ therefore, not affected by XXE.</ p >
117+ < p > Expat only supports accessing URLs if a self-made external entity handler is configured via
118118< a href ="https://libexpat.github.io/doc/api/latest/#XML_SetExternalEntityRefHandler "> < code > XML_SetExternalEntityRefHandler</ code > </ a > .
119- Configuring a URL handler is therefore risky and should not be done if untrusted XML input is
119+ Configuring such a handler is therefore risky and should not be done if untrusted XML input is
120120expected.</ p >
121121< h1 > < a name ="billion-laughs "> </ a > Billion laughs attack</ h1 >
122122< p > TODO</ p >
0 commit comments