You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
JEP 185: Restrict Fetching of External XML Resources introduced system properties for securing applications against security threats such as XML External Entities.
When e.g. the system property -Djavax.xml.accessExternalDTD= is set to the empty list, the JDK parsers throw an exception if the parsed document contains a reference to an external DTD.
When Woodstox is added to the application's class path it replaces the default parsers. But then the system property seems no longer to have any effect, weakening the security of the application.
Since security is generally a major concern Woodstox should honour the properties introduced by JEP 185.
The text was updated successfully, but these errors were encountered:
@veita forgot to add the important part: Thank you for reporting this.
I hope we can update things to support newer Oracle additions, even if communication lines do not always seem to work well (we used to get more patches, updates, from them, couple of years ago).
JEP 185: Restrict Fetching of External XML Resources introduced system properties for securing applications against security threats such as XML External Entities.
When e.g. the system property
-Djavax.xml.accessExternalDTD=
is set to the empty list, the JDK parsers throw an exception if the parsed document contains a reference to an external DTD.When Woodstox is added to the application's class path it replaces the default parsers. But then the system property seems no longer to have any effect, weakening the security of the application.
Since security is generally a major concern Woodstox should honour the properties introduced by JEP 185.
The text was updated successfully, but these errors were encountered: