Re: Vulnerability by loading doctype-declaration of xml

From: Date: Wed, 29 Feb 2012 20:52:07 +0000
Subject: Re: Vulnerability by loading doctype-declaration of xml
References: 1  Groups: php.internals 
Request: Send a blank email to [email protected] to get a copy of this message
On Wed, 29 Feb 2012 19:30:15 +0100, Simon Schick <[email protected]> wrote:

I just read this post about a vulnerability by loading doctype-declaration of an xml-string given in a request: http://www.idontplaydarts.com/2011/02/scanning-the-internal-network-using-simplexml/ Would it be a good point to restrict which urls can be loaded in the doctype, or is the following line the only possibility to prevent it in a good way? libxml_disable_entity_loader(true);
In PHP 5.4, you can use libxml_set_external_entity_loader() and define your own logic. I'm afraid it's not documented yet, but it receives a callback that takes two strings, a public id and system id and a context (an array with four keys). The callback should return a resource, a string from which a resource can be opened, or NULL. -- Gustavo Lopes

Thread (3 messages)

« previous php.internals (#58348) next »