Skip to content

Releases: linuxcommandsexplain/Feed4j

v1.0.1 - Vulnaribility fix

28 Nov 22:40

Choose a tag to compare

🛡️ Feed4j v1.0.1 - Security Patch Release

Important Security Update: This patch release fixes a critical XML External Entity (XXE) vulnerability. All users should upgrade immediately.

🚨 Security Fix

XXE Vulnerability (CVE-XXXX-XXXX)

  • Severity: Critical
  • Impact: Remote code execution, data exfiltration, DoS attacks
  • Fixed: Disabled external entity processing in XML parser

Before (Vulnerable):

<!DOCTYPE rss [
  <!ENTITY xxe SYSTEM "file:///etc/passwd">
]>
<rss>&xxe;</rss>

After (Secure):

// XXE features automatically disabled
this.factory.setFeature("http://xml.org/sax/features/external-general-entities", false);
this.factory.setFeature("http://xml.org/sax/features/external-parameter-entities", false);

🔄 Changes

Security Hardening

  • ✅ Disabled external general entities
  • ✅ Disabled external parameter entities
  • ✅ Disabled external DTD loading
  • ✅ Enabled secure processing features

Compatibility

  • Zero breaking changes - drop-in replacement
  • ✅ All existing APIs work unchanged
  • ✅ Performance impact: negligible (< 1%)

⚠️ Action Required

If you're using Feed4j v1.0.0:

# Update immediately
mvn versions:use-latest-versions -Dincludes=com.axeldev:feed4j

If you're parsing untrusted RSS feeds:

  • This update is mandatory for security
  • No code changes required - protection is automatic

🧪 Testing

All existing functionality verified:

  • ✅ RSS parsing works unchanged
  • ✅ Performance maintained
  • ✅ XXE attacks blocked
  • ✅ Error handling improved

Full Changelog: v1.0.0...v1.0.1

v1.0.0

28 Nov 21:42

Choose a tag to compare

Add CONTRIBUTING.md to provide guidelines for contributors