Hi,

> -----Original Message-----
> From: Pierre Joye [mailto:pierre....@gmail.com]
> Sent: Wednesday, July 29, 2015 11:01 PM
> To: Anthony Ferrara <ircmax...@gmail.com>
> Cc: PHP internals <internals@lists.php.net>
> Subject: Re: [PHP-DEV] Disabling External Entities in libxml By Default
> 
> On Jul 29, 2015 11:38 PM, "Anthony Ferrara" <ircmax...@gmail.com> wrote:
> >
> > All,
> >
> > I wanted to float an idea by you for PHP 7 (or 7.1 depending on the
> > RM's feedback).
> >
> > Currently, PHP by default is vulnerable to XXE attacks:
> > https://www.owasp.org/index.php/XML_External_Entity_(XXE)_Processing
> >
> > To bypass this, you need to turn off external entity loading:
> >
> > libxml_disable_entity_loader(true);
> >
> > What I'm proposing is to disable entity loading by default. That way
> > it requires developers to opt-in to actually load external entities.
> >
> > Thoughts?
> 
> I am for it, for 7.0 or 8.0.
> 
> We discussed it during the last related flaw and decided not to do it for BC
> reasons (whatever it means in this case).
> 
> This problem went off our radar, so yes, we should do it in 7.0. Changing 
> default
> in minor versions always create more troubles.
> 
To note were that the libxml-2.9.2 in Windows builds already contains patches 
mentioned in https://www.debian.org/security/2013/dsa-2652 , see 
https://github.com/winlibs/libxml2/commit/727e357fb21b95d5c315518bdac99a70a6d15ff8
 ... Most of the distributions should already have these patches. Probably we 
should check whether disabling it in PHP were unnecessary, but if it's not - 
ofc 7.0 should be the target at least.

Regards

Anatol



--
PHP Internals - PHP Runtime Development Mailing List
To unsubscribe, visit: http://www.php.net/unsub.php

Reply via email to