-
Notifications
You must be signed in to change notification settings - Fork 0
/
79.json
13 lines (13 loc) · 929 Bytes
/
79.json
1
2
3
4
5
6
7
8
9
10
11
12
13
{
"file_path": "security_data/gpt3_security_vulnerability_scanner-main/XXE/xxe1.cs",
"vulnerability": "Vulnerability Detected: XXE (XML External Entity) Injection. The code is vulnerable to XXE injection attacks because it does not disable external entity resolution when parsing XML documents.",
"source code": "using Microsoft.AspNetCore.Mvc;\nusing System;\nusing System.Xml;\n\nnamespace WebFox.Controllers\n{\n [Route(\"api/[controller]\")]\n [ApiController]\n public class XxeTest1 : ControllerBase\n {\n\n [HttpGet(\"{xmlString}\")]\n public void DoXxe(String xmlString)\n {\n XmlDocument xmlDoc = new XmlDocument();\n xmlDoc.LoadXml(xmlString);\n }\n }\n}",
"language": "csharp",
"cwe_identifier": null,
"pattern_desc": null,
"line_number": null,
"line_text": null,
"pattern_id": null,
"rule": null,
"label": 1
}