fix vulnerability identified by Sonar 26/86826/4
authorguillaume.lambert <guillaume.lambert@orange.com>
Thu, 9 Jan 2020 14:15:57 +0000 (15:15 +0100)
committerguillaume.lambert <guillaume.lambert@orange.com>
Fri, 10 Jan 2020 08:59:12 +0000 (09:59 +0100)
JIRA: TRNSPRTPCE-193
Signed-off-by: guillaume.lambert <guillaume.lambert@orange.com>
Change-Id: Ifce9b71e5c9233145188107586428039f38b1c16

common/src/main/java/org/opendaylight/transportpce/common/converter/XMLDataObjectConverter.java

index 90efeca088cdea7b68df5499dbf871b88785fd1a..a83fa3787111cd5b23abdb079762c7f0172e5c79 100644 (file)
@@ -58,6 +58,9 @@ public final class XMLDataObjectConverter extends AbstractDataObjectConverter {
     private XMLDataObjectConverter(SchemaContext schemaContext, BindingNormalizedNodeSerializer codecRegistry) {
         super(schemaContext, codecRegistry);
         this.xmlInputFactory = XMLInputFactory.newInstance();
+        // set external DTD and schema to null to avoid vulnerability (sonar report)
+        this.xmlInputFactory.setProperty(XMLConstants.ACCESS_EXTERNAL_DTD, "");
+        this.xmlInputFactory.setProperty(XMLConstants.ACCESS_EXTERNAL_SCHEMA, "");
     }
 
     /**