Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

fix: "Mitigated XXE vulnerability in contact.php" #638

Open
wants to merge 1 commit into
base: master
Choose a base branch
from

Conversation

unixlira
Copy link

@unixlira unixlira commented Oct 7, 2024

Aqui está um template ajustado para a criação de um Pull Request, focado em explicar de forma clara a solução para a mitigação da vulnerabilidade:


This solution refers to which of the apps?

A5 - ViniJR Blog (Security Misconfiguration - XXE)

What did you do to mitigate the vulnerability?

To mitigate the XXE vulnerability, I disabled the loading of external entities in the XML parser by using the following flags:

  • LIBXML_NOENT flag was removed.
  • LIBXML_DTDLOAD was replaced with LIBXML_NONET to prevent any external entities from being loaded.

These changes ensure that no external entities or files can be accessed through XML input, mitigating the risk of sensitive information disclosure or denial of service attacks.

Did you test your changes? What commands did you run?

Yes, I tested the changes by reproducing the original attack narrative using the malicious evilxml.xml payload. After the mitigation, the application no longer responds with the contents of sensitive files such as /etc/passwd. The command used for testing was:

curl -d @evilxml.xml http://localhost:10004/contact.php ; echo

The output no longer shows sensitive information, confirming that the vulnerability has been successfully mitigated.


Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

1 participant