Описание
It was discovered that an internal Prosody library to load XML based on libexpat does not properly restrict the XML features allowed in parsed XML data. Given suitable attacker input, this results in expansion of recursive entity references from DTDs (CWE-776). In addition, depending on the libexpat version used, it may also allow injections using XML External Entity References (CWE-611).
Пакеты
| Пакет | Статус | Версия исправления | Релиз | Тип |
|---|---|---|---|---|
| prosody | fixed | 0.11.12-1 | package | |
| prosody | ignored | stretch | package |
Примечания
https://prosody.im/security/advisory_20220113/
Patch: https://prosody.im/security/advisory_20220113/1.patch
https://hg.prosody.im/0.11/raw-rev/783056b4e448
https://www.openwall.com/lists/oss-security/2022/01/13/3
Regression: https://issues.prosody.im/1711
Regression fix: https://hg.prosody.im/trunk/rev/e5e0ab93d7f4
Связанные уязвимости
It was discovered that an internal Prosody library to load XML based on libexpat does not properly restrict the XML features allowed in parsed XML data. Given suitable attacker input, this results in expansion of recursive entity references from DTDs (CWE-776). In addition, depending on the libexpat version used, it may also allow injections using XML External Entity References (CWE-611).
It was discovered that an internal Prosody library to load XML based on libexpat does not properly restrict the XML features allowed in parsed XML data. Given suitable attacker input, this results in expansion of recursive entity references from DTDs (CWE-776). In addition, depending on the libexpat version used, it may also allow injections using XML External Entity References (CWE-611).
Уязвимость реализации модуля WebSocket сервера для Jabber/XMPP Prosody, позволяющая нарушителю вызвать отказ в обслуживании