Force syntax attack

Studying xml vulnerabilities, I ran into a power syntax attack. can anyone say what constitutes a forced syntax attack (in SOA applications). How is the attack? How to implement this attack using XML parser in java?

+3
source share
3 answers

For an example of this attack, see the Billion Laughs Attack section.

For a full discussion of attack, testing, and basic security features, see the "Webware Testing Cookbook" recipe for malicious XML. (Google’s free preview - just 3 pages). Exposure:

" XML XML- ... ".

:

http://www.ibm.com/developerworks/xml/library/x-tipcfsx.html

http://en.wikipedia.org/wiki/Billion_laughs

+3

- XML-, XML-, , . , , , , . , .

, -.

0

(DTD) .
XML "CDATA", '<', '&'.
XML- . te cdata , , , .
, xpath.

-2

Source: https://habr.com/ru/post/1723854/


All Articles