Project

General

Profile

Actions

Task #96583

closed

Remove PHP < 8 specific libxml_disable_entity_loader()

Added by Christian Kuhn almost 3 years ago. Updated about 2 years ago.

Status:
Closed
Priority:
Should have
Assignee:
-
Category:
-
Target version:
-
Start date:
2022-01-19
Due date:
% Done:

100%

Estimated time:
TYPO3 Version:
12
PHP Version:
Tags:
Complexity:
Sprint Focus:
Actions #1

Updated by Gerrit Code Review almost 3 years ago

  • Status changed from New to Under Review

Patch set 1 for branch main of project Packages/TYPO3.CMS has been pushed to the review server.
It is available at https://review.typo3.org/c/Packages/TYPO3.CMS/+/73063

Actions #2

Updated by Gerrit Code Review almost 3 years ago

Patch set 2 for branch main of project Packages/TYPO3.CMS has been pushed to the review server.
It is available at https://review.typo3.org/c/Packages/TYPO3.CMS/+/73063

Actions #3

Updated by Christian Kuhn almost 3 years ago

  • Status changed from Under Review to Resolved
  • % Done changed from 0 to 100
Actions #4

Updated by Oliver Hader almost 3 years ago

Some (historic) references:

[...] At least with libxml2 version 2.9, the processing of XML external entities is disabled per default - and cannot be exploited. [...]

Back in 2020 all major OS distributions used a safe libxml2 version - it was not possible back than to exploit XXE in the TYPO3 core - unless entity expansion was explicitly enabled in PHP code with LIBXML_NOENT when invoking the parser.

I'm just leaving this comment here for potential "security researchers" reporting things for TYPO3 before v12 (not having a PHP 8.0 requirement).

Actions #5

Updated by Benni Mack about 2 years ago

  • Status changed from Resolved to Closed
Actions

Also available in: Atom PDF