Improper Restriction of XML External Entity Reference in org.cyclonedx:cyclonedx-core-java
High severity
GitHub Reviewed
Published
Jun 24, 2024
in
CycloneDX/cyclonedx-core-java
•
Updated Jun 28, 2024
Package
Affected versions
>= 2.1.0, < 9.0.4
Patched versions
9.0.4
Description
Published to the GitHub Advisory Database
Jun 24, 2024
Reviewed
Jun 24, 2024
Published by the National Vulnerability Database
Jun 28, 2024
Last updated
Jun 28, 2024
Impact
Before deserializing CycloneDX Bill of Materials in XML format, cyclonedx-core-java leverages XPath expressions to determine the schema version of the BOM. The
DocumentBuilderFactory
used to evaluate XPath expressions was not configured securely, making the library vulnerable to XML External Entity (XXE) injection.XXE injection can be exploited to exfiltrate local file content, or perform Server Side Request Forgery (SSRF) to access infrastructure adjacent to the vulnerable application.
PoC
Patches
The vulnerability has been fixed in cyclonedx-core-java version 0.9.4.
Workarounds
If feasible, applications can reject XML documents before handing them to cyclonedx-core-java for parsing.
This may be an option if incoming CycloneDX BOMs are known to be in JSON format.
References
References