Skip to content

Navigation Menu

Sign in
Appearance settings

Search code, repositories, users, issues, pull requests...

Provide feedback

We read every piece of feedback, and take your input very seriously.

Saved searches

Use saved searches to filter your results more quickly

Appearance settings

Security: css4j/css4j

SECURITY.md

Reporting a vulnerability


Only the latest version is supported, and it is recommended that you check whether the latest master branch is vulnerable before reporting any issue.

If you think that you have found an XXE vulnerability, please skip to next section.

To report a security vulnerability, please read Privately reporting a security vulnerability.


XMLDocumentBuilder and XXE

The XMLDocumentBuilder.java does not use the load-external-dtd nor disallow-doctype-decl features, resorting to different strategies instead to keep parsing safe (the aforementioned configurations cause data loss when entities are used). All of the security scanners tested so far do not flag any vulnerability on css4j. However it is possible that some future scanner behaves otherwise, so this section was written.

See XML parsing in Java with DefaultEntityResolver for details. In fact there are multiple unit tests that check how XMLDocumentBuilder handles DTDs, with and without a secure resolver.

There aren't any published security advisories

Morty Proxy This is a proxified and sanitized view of the page, visit original site.