Recipe Name:
XXE: DocumentBuilderFactory: Set features to true
Description:
Could lead to XXE
Level:
error
Language:
  • java
Tags:
  • security
  • XXE
  • basic protection set
  • OWASP Top 10
Documentation

When the XML processor is not configured correctly to handle references and entities, it may be susceptible to so-called XML external entities (XXE) attacks.

In order to prevent XXE vulnerabilities, the XML processor needs to be configured correctly. As stated on the OWASP XXE Cheat Sheet: "The safest way to prevent XXE is always to disable DTDs (External Entities) completely. Depending on the parser, the method should be similar to the following: factory.setFeature("http://apache.org/xml/features/disallow-doctype-decl", true);. If it is not possible to disable DTDs completely, then external entities and external document type declarations must be disabled in the way that's specific to each parser." For specific instructions per parser we refer to the OWASP XXE Cheat Sheet as well.

Resources
Recipe
id: scw:xxe:documentbuilderfactory-features-true
version: 10
metadata:
  name: 'XXE: DocumentBuilderFactory: Set features to true'
  shortDescription: Could lead to XXE
  level: error
  language: java
  newCodeOnly: false
  scwCategory: injection:xml
  cweCategory: 611
  enabled: true
  descriptionFile: Java/XML/descriptions/XXE.html
  tags: security;XXE;basic protection set;OWASP Top 10
search:
  methodcall:
    args:
      1:
        type: java.lang.String
        value:
          stringified: http://apache.org/xml/features/disallow-doctype-decl
      2:
        type: boolean
        value:
          stringified: "false"
    name: setFeature
    declaration:
      type: javax.xml.parsers.DocumentBuilderFactory
availableFixes:
- name: Set features to true
  actions:
  - rewrite:
      to: '{{{ expressionElement }}}({{{ arguments.0 }}}, true)'