XML vulnerability #4218
Closed
nathan130200
started this conversation in
General
Replies: 2 comments 2 replies
-
Did you sent that to port 5222, or used something else? We are using expat, and we terminate stream when we receive DOCTYPE in it, so we shouldn't be vulnerable to this (and i see that it works like that on my server). |
Beta Was this translation helpful? Give feedback.
1 reply
-
Can't reproduce it here, and looking at our code, part that reject <DOCTYPE declarations is there for like decade. |
Beta Was this translation helpful? Give feedback.
1 reply
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
-
I think ejabberd may be the target of a critical vulnerability. The famous "attack of billions of laughs".
https://en.wikipedia.org/wiki/Billion_laughs_attack
I tested on some local servers with ejabberd. I sent the same XML document and noticed that the server stopped responding infinitely, unless I restarted it.
Consider using expat... Furthermore, it doesn't even make sense to process DTD entities, as it is not part of the XMPP protocol.
I would like you to carry out the tests and confirm if you can also reproduce this or if it was just an isolated case/bad luck.
Beta Was this translation helpful? Give feedback.
All reactions