Fix for XXE docs

This commit is contained in:
Bartosz Bogatko
2018-11-18 13:18:01 +01:00
committed by Nanne Baars
parent f81a6852db
commit bf45a0a8e5

View File

@ -2,6 +2,7 @@
An XML Entity allows tags to be defined that will be replaced by content when the XML Document is parsed. An XML Entity allows tags to be defined that will be replaced by content when the XML Document is parsed.
In general there are three types of entities: In general there are three types of entities:
* internal entities * internal entities
* external entities * external entities
* parameter entities. * parameter entities.
@ -34,6 +35,7 @@ may be exploited by dereferencing a malicious URI, possibly allowing arbitrary c
local resources that may not stop returning data, possibly impacting application availability if too many threads or processes are not released. local resources that may not stop returning data, possibly impacting application availability if too many threads or processes are not released.
In general we can distinguish the following kind of XXE attacks: In general we can distinguish the following kind of XXE attacks:
* Classic: in this case an external entity is included in a local DTD * Classic: in this case an external entity is included in a local DTD
* Blind: no output and or errors are shown in the response * Blind: no output and or errors are shown in the response
* Error: try to get the content of a resource in the error message * Error: try to get the content of a resource in the error message