CAPEC-231: Oversized Serialized Data Payloads

ID CAPEC-231
Typical Severity High
Likelihood Of Attack Medium
Status Draft

An adversary injects oversized serialized data payloads into a parser during data processing to produce adverse effects upon the parser such as exhausting system resources and arbitrary code execution.

Applications often need to transform data in and out of serialized data formats, such as XML and YAML, by using a data parser. It may be possible for an adversary to inject data that may have an adverse effect on the parser when it is being processed. By supplying oversized payloads in input vectors that will be processed by the parser, an adversary can cause the parser to consume more resources while processing, causing excessive memory consumption and CPU utilization, and potentially cause execution of arbitrary code. An adversary's goal is to leverage parser failure to their advantage. DoS is most closely associated with web services, SOAP, and Rest, because remote service requesters can post malicious data payloads to the service provider designed to exhaust the service provider's memory, CPU, and/or disk space. This attack exploits the loosely coupled nature of web services, where the service provider has little to no control over the service requester and any messages the service requester sends.

https://capec.mitre.org/data/definitions/231.html

Weaknesses

# ID Name Type
CWE-20 Improper Input Validation weakness
CWE-112 Missing XML Validation weakness
CWE-674 Uncontrolled Recursion weakness
CWE-770 Allocation of Resources Without Limits or Throttling weakness
Loading...