-
Notifications
You must be signed in to change notification settings - Fork 1.6k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Update Qualys WebApp parser to use DefusedXML #10637
Conversation
DryRun Security SummaryThe provided code change focuses on enhancing the security of the Qualys WebApp parser by addressing a potential XML External Entity (XXE) vulnerability through the use of the Expand for full summarySummary: The provided code change is focused on enhancing the security of the Qualys WebApp parser by addressing a potential XML External Entity (XXE) vulnerability. The key changes include:
These changes are a proactive security measure to mitigate the risk of XXE vulnerabilities in the Qualys WebApp parser. XXE vulnerabilities can allow attackers to access sensitive data or perform other malicious actions, so replacing the standard XML parsing library with a more secure alternative is a recommended security practice. Files Changed:
Code AnalysisWe ran Riskiness🟢 Risk threshold not exceeded. |
Quality Gate passedIssues Measures |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Approved
The Qualys WebApp parser is not using defusedXML like the rest of the parsers. This needs to change as defusedXML is widely considered to be the more secure option
[sc-7039]