XSLT Injection
Description
It is possible to supply an XSL template to a server-side XSLT processor. XSLT processors can be abused to read or write files, initiate outbound connections, and in some cases execute arbitrary code.
Remediation
Applications should never accept user-supplied style sheets. XSLT processors are not built to handle potentially malicious stylesheet files. However, some processors do implement or offer security features which may be available. Consult the documentation for the XSLT processor used by the target application for security guidelines and hardening steps. It is recommended that all XML parsers and processors at the very least disable external entity resolution.
Details
ID | Aggregated | CWE | Type | Risk |
---|---|---|---|---|
74.1 | false | 74 | Active | high |
Links
Docs
Edit this page to fix an error or add an improvement in a merge request.
Create an issue to suggest an improvement to this page.
Product
Create an issue if there's something you don't like about this feature.
Propose functionality by submitting a feature request.
Feature availability and product trials
View pricing to see all GitLab tiers and features, or to upgrade.
Try GitLab for free with access to all features for 30 days.
Get help
If you didn't find what you were looking for, search the docs.
If you want help with something specific and could use community support, post on the GitLab forum.
For problems setting up or using this feature (depending on your GitLab subscription).
Request support