-
-
Notifications
You must be signed in to change notification settings - Fork 680
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
V5.5.2 "prevent XXE" vs "prevent XXE attack" #794
Comments
I'd push this live right away, good stuff
- Jim
On 5/29/20 8:06 PM, Elar Lang wrote:
V5.5.2
<https://github.com/OWASP/ASVS/blob/master/4.0/en/0x13-V5-Validation-Sanitization-Encoding.md#v55-deserialization-prevention-requirements>
Current:
V5.5.2 Verify that the application correctly restricts XML parsers
to only use the most restrictive configuration possible and to
ensure that unsafe features such as resolving external entities
are disabled to prevent *XXE*.
* "XXE" = "XML External Entity"
* "to prevent XXE" = "to prevent XML External Entity".
Should be "to prevent XML External Entity attack"
Proposal:
V5.5.2 Verify that the application correctly restricts XML parsers
to only use the most restrictive configuration possible and to
ensure that unsafe features such as resolving external entities
are disabled to prevent *XML External Entity (XXE) attack*.
—
You are receiving this because you are subscribed to this thread.
Reply to this email directly, view it on GitHub
<#794>, or unsubscribe
<https://github.com/notifications/unsubscribe-auth/AAEBYCIOEAHLZ32XWKA5CIDRUBEYNANCNFSM4NON5M5Q>.
--
Jim Manico
Manicode Security
https://www.manicode.com
|
tghosth
added a commit
that referenced
this issue
Jun 2, 2020
tghosth
added a commit
that referenced
this issue
Jun 2, 2020
Nice, done |
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
V5.5.2
Current:
Should be "to prevent XML External Entity attack"
Proposal:
The text was updated successfully, but these errors were encountered: