CAPEC-221: Data Serialization External Entities Blowup

ID CAPEC-221
Status Draft

This attack takes advantage of the entity replacement property of certain data serialization languages (e.g., XML, YAML, etc.) where the value of the replacement is a URI. A well-crafted file could have the entity refer to a URI that consumes a large amount of resources to create a denial of service condition. This can cause the system to either freeze, crash, or execute arbitrary code depending on the URI.

https://capec.mitre.org/data/definitions/221.html

Weaknesses

# ID Name Type
CWE-611 Improper Restriction of XML External Entity Reference weakness

Taxonomiy Mapping

Type # ID Name
WASC 43 XML External Entities
Loading...