An XML External Entity attack is a type of attack against an application that parses XML input. This attack occurs when XML input containing a reference to an external entity is processed by a weakly configured XML parser. This attack may lead to the disclosure of confidential data, denial of service, server side request forgery, port scanning from the perspective of the machine where the parser is located, and other system impacts.
Neo4j Apoc Procedures parses XML files retrieved from a remote location. This parsing is performed using an insecure XML parser.
Where the Issue Occurred
The code below retrieves the XML content and performs insecure XML parsing (found on line 74 neo4j-apoc-procedures/src/main/java/apoc/load/Xml.java#L74):
- Issue Reported: 29th September 2018
- Issue Resolved: 27th October 2018
- Blog Post Published: 27th October 2018
- Applied for CVE: