CVE-2025-27136 – LocalS3 CreateBucketConfiguration XXE Injec... #1187
Add this suggestion to a batch that can be applied as a single commit.
This suggestion is invalid because no changes were made to the code.
Suggestions cannot be applied while the pull request is closed.
Suggestions cannot be applied while viewing a subset of changes.
Only one suggestion per line can be applied in a batch.
Add this suggestion to a batch that can be applied as a single commit.
Applying suggestions on deleted lines is not supported.
You must change the existing code in this line in order to create a valid suggestion.
Outdated suggestions cannot be applied.
This suggestion has been applied or marked resolved.
Suggestions cannot be applied from pending reviews.
Suggestions cannot be applied on multi-line comments.
Suggestions cannot be applied while the pull request is queued to merge.
Suggestion cannot be applied right now. Please check back later.
🤖 Automated Content Update
This PR was automatically generated by the HackTricks News Bot based on a technical blog post.
📝 Source Information
🎯 Content Summary
CVE-2025-27136: XML External Entity (XXE) Injection in LocalS3
Overview
The CVE-2025-27136 vulnerability is an XML External Entity (XXE) injection in LocalS3’s
CreateBucketConfiguration
endpoint affecting all versions prior to1.21
. With a CVSS 3.1 score of5.5 (Medium)
, this flaw allows unauthenticated remote attackers to read arbitrary files from the server’s filesystem by abusing external e...🔧 Technical Details
Java’s
DocumentBuilderFactory
and similar XML parsers resolve external entities by default unless explicitly disabled, enabling XXE attacks.An attacker crafts a
<!DOCTYPE>
declaration with a SYSTEM entity pointing to afile://
orhttp://
URI (e.g.,<!ENTITY xxe SYSTEM "file:///etc/passwd">
) and injects&xxe;
into an XML element. The parser fetches and substitutes the external resource, leading...🤖 Agent Actions
Added a comprehensive “Java DocumentBuilderFactory hardening example” section to the XXE guide (src/pentesting-web/xxe-xee-xml-external-entity.md):
This enhances Java-specific mitigation coverage for XXE attacks.
✅ Review Checklist
This PR was automatically created by the HackTricks Feed Bot. Please review the changes carefully before merging.