Releases: linuxcommandsexplain/Feed4j
Releases · linuxcommandsexplain/Feed4j
v1.0.1 - Vulnaribility fix
🛡️ Feed4j v1.0.1 - Security Patch Release
Important Security Update: This patch release fixes a critical XML External Entity (XXE) vulnerability. All users should upgrade immediately.
🚨 Security Fix
XXE Vulnerability (CVE-XXXX-XXXX)
- Severity: Critical
- Impact: Remote code execution, data exfiltration, DoS attacks
- Fixed: Disabled external entity processing in XML parser
Before (Vulnerable):
<!DOCTYPE rss [
<!ENTITY xxe SYSTEM "file:///etc/passwd">
]>
<rss>&xxe;</rss>After (Secure):
// XXE features automatically disabled
this.factory.setFeature("http://xml.org/sax/features/external-general-entities", false);
this.factory.setFeature("http://xml.org/sax/features/external-parameter-entities", false);🔄 Changes
Security Hardening
- ✅ Disabled external general entities
- ✅ Disabled external parameter entities
- ✅ Disabled external DTD loading
- ✅ Enabled secure processing features
Compatibility
- ✅ Zero breaking changes - drop-in replacement
- ✅ All existing APIs work unchanged
- ✅ Performance impact: negligible (< 1%)
⚠️ Action Required
If you're using Feed4j v1.0.0:
# Update immediately
mvn versions:use-latest-versions -Dincludes=com.axeldev:feed4jIf you're parsing untrusted RSS feeds:
- This update is mandatory for security
- No code changes required - protection is automatic
🧪 Testing
All existing functionality verified:
- ✅ RSS parsing works unchanged
- ✅ Performance maintained
- ✅ XXE attacks blocked
- ✅ Error handling improved
Full Changelog: v1.0.0...v1.0.1
v1.0.0
Add CONTRIBUTING.md to provide guidelines for contributors