Vulnerable to XML Entity Expansion Injection? #626
-
Recently, vulnerability scanning tools discovered "a vulnerability" with our project which has an integration with passport-saml. Although our nodejs server functions use sanitized JSON for inbound communication, it was discovered that through the passport-saml authentication process we have inbound SAML XML. The security team wanted assurances that passport-saml wasn't vulnerable to this attack. In reviewing documented cases which seem related to the vulnerability, we found two listed discoveries (attached urls below) that don't seem tied to a corrective action in any Passport-saml commits. Is this a real problem? Or does passport sanitize the signed assertion XML document it gets from the Client/IDP? ///Here is our scanned results: Severity: High Security Risks: Create an XML document using following features– · Define an entity ]> ]> The safest way to prevent XXE is always to disable DTDs (External Entities) completely. Two related SAML XML CVE/CWE's?: |
Beta Was this translation helpful? Give feedback.
Replies: 1 comment 3 replies
-
@UIDecypher This a volunteer-staffed project and we would welcome your help investigating this. By reviewing the source, you can confirm which libraries we use for XML parsing, and then visit the projects for the dependency and confirm if they are patched for this issue. I'm also moving this to a "Discussion" for now, because you are asking if the project is vulnerable, not reporting that you've confirmed that it is. |
Beta Was this translation helpful? Give feedback.
@UIDecypher This a volunteer-staffed project and we would welcome your help investigating this. By reviewing the source, you can confirm which libraries we use for XML parsing, and then visit the projects for the dependency and confirm if they are patched for this issue.
I'm also moving this to a "Discussion" for now, because you are asking if the project is vulnerable, not reporting that you've confirmed that it is.