Miggo Logo

GHSA-v232-254c-m6p7:
LocalS3 Project Vulnerable to XML External Entity (XXE) Injection via Bucket Tagging API

N/A

CVSS Score

Basic Information

CVE ID
-
EPSS Score
-
Published
3/10/2025
Updated
3/10/2025
KEV Status
No
Technology
TechnologyJava

Technical Details

CVSS Vector
-
Package NameEcosystemVulnerable VersionsFirst Patched Version
io.github.robothy:local-s3-restmaven< 1.211.21

Vulnerability Intelligence
Miggo AIMiggo AI

Miggo AIRoot Cause Analysis

The vulnerability stems from insecure XML parser configurations in two locations:

  1. LocalS3.java's service factory creation method initialized an XMLInputFactory without disabling DTD support (SUPPORT_DTD) and external entities (IS_SUPPORTING_EXTERNAL_ENTITIES)
  2. XmlUtils.java's static initializer similarly created an insecure parser configuration Both locations process XML input for bucket tagging operations. The commit diff shows these were exactly the locations where security properties were added to fix the XXE vulnerability, confirming these were the vulnerable entry points. The functions directly control XML parsing configuration, making them root causes of the vulnerability.

Vulnerable functions

Only Mi**o us*rs **n s** t*is s**tion

WAF Protection Rules

WAF Rule

## **s*ription T** Lo**lS* proj**t, *n S*-*omp*ti*l* stor*** s*rvi**, is vuln*r**l* to XML *xt*rn*l *ntity (XX*) inj**tion t*rou** its *u*k*t t***in* *PI. T** vuln*r**ility *xists ****us* t** *ppli**tion pro**ss*s XML input wit*out prop*rly *is**lin*

Reasoning

T** vuln*r**ility st*ms *rom ins**ur* XML p*rs*r *on*i*ur*tions in two lo**tions: *. Lo**lS*.j*v*'s s*rvi** ***tory *r**tion m*t*o* initi*liz** *n XMLInput***tory wit*out *is**lin* *T* support (SUPPORT_*T*) *n* *xt*rn*l *ntiti*s (IS_SUPPORTIN*_*XT*RN