changedetection.io_XXE_01 Vulnerability Report: We discovered a XXE vulnerability in the changedetection.io project
While analyzing the code logic, it was determined that an area may lead to unintended behavior under specific conditions. With the project's security in mind, see the analysis results to discern whether this may indicate a potential security risk.
Overview
- SOURCE_VERSION:
0.54.9 (9f3a9fdc18bba404244801e5df8109e213ce9ff4)
- Vulnerability type:
XXE
- Finding title:
XML XPath helpers parse untrusted XML with entity resolution left to lxml defaults
- Affected location:
changedetectionio/html_tools.py:287
Root Cause
xpath_filter() switches to XML mode for XML/RSS content and creates etree.XMLParser(strip_cdata=False) without explicitly disabling external entity resolution, external DTD loading, or network-backed entity lookup. The helper then parses untrusted XML bytes directly with etree.fromstring(...).
Source-to-Sink Chain
- Untrusted XML/RSS response content is fetched from monitored URLs.
- Stream detection marks the content as XML/RSS and the include-filter path invokes
xpath_filter(..., is_xml=True).
xpath_filter() builds the default XML parser and calls etree.fromstring(...) at changedetectionio/html_tools.py:287.
- External entity declarations in attacker XML can be expanded by parser-default behavior in affected runtime combinations.
Exploitation Preconditions
- Attacker controls the watched XML/RSS response body.
- The watch uses an XPath include filter that triggers XML helper parsing.
- Runtime parser behavior allows external entity expansion (for example, vulnerable dependency/default combinations).
- The process can read the referenced local resource.
Risk
The XML helper path can turn watch processing into a local file disclosure primitive when entity expansion is enabled by parser defaults.
Impact
Sensitive local files can be exposed into extracted watch output, diff history, and downstream notification channels.
Remediation
- Harden XML parser construction with
resolve_entities=False, load_dtd=False, and no_network=True.
- Reject
DOCTYPE/entity declarations for untrusted XML if DTD features are unnecessary.
- Add regression tests that assert external entities are never expanded in XPath XML helper flows.
References
changedetection.io_XXE_01 Vulnerability Report: We discovered a XXE vulnerability in the changedetection.io project
While analyzing the code logic, it was determined that an area may lead to unintended behavior under specific conditions. With the project's security in mind, see the analysis results to discern whether this may indicate a potential security risk.
Overview
0.54.9 (9f3a9fdc18bba404244801e5df8109e213ce9ff4)XXEXML XPath helpers parse untrusted XML with entity resolution left to lxml defaultschangedetectionio/html_tools.py:287Root Cause
xpath_filter()switches to XML mode for XML/RSS content and createsetree.XMLParser(strip_cdata=False)without explicitly disabling external entity resolution, external DTD loading, or network-backed entity lookup. The helper then parses untrusted XML bytes directly withetree.fromstring(...).Source-to-Sink Chain
xpath_filter(..., is_xml=True).xpath_filter()builds the default XML parser and callsetree.fromstring(...)atchangedetectionio/html_tools.py:287.Exploitation Preconditions
Risk
The XML helper path can turn watch processing into a local file disclosure primitive when entity expansion is enabled by parser defaults.
Impact
Sensitive local files can be exposed into extracted watch output, diff history, and downstream notification channels.
Remediation
resolve_entities=False,load_dtd=False, andno_network=True.DOCTYPE/entity declarations for untrusted XML if DTD features are unnecessary.References