8000 [hcaaOlXR] Various security fixes by AzuObs · Pull Request #202 · neo4j/apoc · GitHub
[go: up one dir, main page]
More Web Proxy on the site http://driver.im/
Skip to content

[hcaaOlXR] Various security fixes #202

New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Merged
merged 2 commits into from
Oct 3, 2022
Merged

[hcaaOlXR] Various security fixes #202

merged 2 commits into from
Oct 3, 2022

Conversation

AzuObs
Copy link
Contributor
@AzuObs AzuObs commented Sep 29, 2022

Makes XML procedures resistant to XXE attacks by following the general advice which is to disable External Entities. This is what we had done previously for apoc.load.xml and apoc.xml.parse, but forgot to do for apoc.import.xml.

@AzuObs AzuObs added bug Something isn't working team-cypher-surface 5.1 labels Sep 29, 2022
@AzuObs AzuObs changed the title [hcaaOlXR] Make XML procedures resistant to attacks [hcaaOlXR] Various security fixes Sep 30, 2022
Copy link
Contributor
@gem-neo4j gem-neo4j left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Looks good! :D

@AzuObs AzuObs merged commit 6577451 into dev Oct 3, 2022
@AzuObs AzuObs deleted the dev_hcaaOlXR_codeql_alerts branch October 3, 2022 07:49
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
5.1 bug Something isn't working team-cypher-surface
Projects
None yet
Development

Successfully merging this pull request may close these issues.

2 participants
0