Only the latest version is supported, and it is recommended that you check
whether the latest master
branch is vulnerable before reporting any issue.
If you think that you have found an XXE vulnerability, please skip to next section.
To report a security vulnerability, please read Privately reporting a security vulnerability.
The XMLDocumentBuilder.java
does not use the load-external-dtd
nor
disallow-doctype-decl
features, resorting to different strategies instead
to keep parsing safe (the aforementioned configurations cause data loss when
entities are used). All of the security scanners tested so far do not flag any
vulnerability on css4j. However it is possible that some future scanner behaves
otherwise, so this section was written.
See XML parsing in Java with DefaultEntityResolver
for details. In fact there are multiple unit tests that check how XMLDocumentBuilder
handles DTDs, with and without a secure resolver.