You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
{{ message }}
This repository was archived by the owner on Jun 10, 2025. It is now read-only.
ueboot-core provides XML utility classes that may be vulnerable to XXE when using XMLUtil.doXMLParse(String strxml) to interpret untrusted XML strings.Attacker can get important file content on the server by it.
Detail
The program will call SAXReader.read(InputStream in) to parse an untrusted XML string and allow reference external entities , can causing a XXE vulnerability.
https://github.com/ueboot/ueboot/blob/55763e037fd339ca0e8165ccda185ce5028deb03/ueboot-core/src/main/java/com/ueboot/core/utils/XMLUtil.java#LL35C19-L35C26
Description
ueboot-core provides XML utility classes that may be vulnerable to XXE when using XMLUtil.doXMLParse(String strxml) to interpret untrusted XML strings.Attacker can get important file content on the server by it.
Detail
The program will call SAXReader.read(InputStream in) to parse an untrusted XML string and allow reference external entities , can causing a XXE vulnerability.
Version
<= 3.1.0
POC
Attack
Attacker can read the content of c:/windows/win.ini by it.
