CWE-827: Improper Control of Document Type Definition
Weakness ID: 827
The software does not restrict a reference to a Document Type Definition (DTD) to the intended control sphere. This might allow attackers to reference arbitrary DTDs, possibly causing the software to expose files, consume excessive system resources, or execute arbitrary http requests on behalf of the attacker.
As DTDs are processed, they might try to read or include files on the machine performing the parsing. If an attacker is able to control the DTD, then the attacker might be able to specify sensitive resources or requests or provide malicious content.
For example, the SOAP specification prohibits SOAP messages from containing DTDs.
Technical Impact: Read files or
If the attacker is able to include a crafted DTD and a default entity
resolver is enabled, the attacker may be able to access arbitrary files
on the system.