-
-
Notifications
You must be signed in to change notification settings - Fork 96
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Multiple security issues in ezxml #267
Comments
AFAIK, ezxml is only used to parse the configuration file at startup, and thus these vulnerabilities are not exploitable remotely. A malicious mapcache.xml could be crafted to gain superuser privileges (as the xml parsing is done as root before apache forks to an unpriviledged user), but then again the apache conf files (which mapcache.xml is when using mod_mapcache) should already only be writable only by root. |
Could it make sense to remove the dependency on ezxml in favor of another XML reader? |
libxml2 is a much healthier project. |
Can MapCache move away from ezxml to libxml2 or (and embedded copy of) tinyxml2? |
I agree this would be a very good idea. Question is who is available to do that work. |
If no one is available, how much funding will be required to commission the work to move away from ezxml? |
It might also make sense to use libapr's xml parsing capabilities as that won't lead to adding another dependency |
As reported by Moritz Muehlenhoff in Debian Bug #989363:
Another ezxml issue as reported in Debian Bug #1014389:
The text was updated successfully, but these errors were encountered: