It was discovered that an internal Prosody library to load XML based on libexpat does not properly restrict the XML features allowed in parsed XML data. Given suitable attacker input, this results in expansion of recursive entity references from DTDs (CWE-776). In addition, depending on the libexpat version used, it may also allow injections using XML External Entity References (CWE-611).
The product uses XML documents and allows their structure to be defined with a Document Type Definition (DTD), but it does not properly control the number of recursive definitions of entities.
The product processes an XML document that can contain XML entities with URIs that resolve to documents outside of the intended sphere of control, causing the product to embed incorrect documents into its output.
Link | Tags |
---|---|
https://bugzilla.redhat.com/show_bug.cgi?id=2040639 | third party advisory issue tracking |
https://prosody.im/security/advisory_20220113/ | patch vendor advisory exploit |
https://prosody.im/security/advisory_20220113/1.patch | patch vendor advisory |