This site is the archived OWASP Foundation Wiki and is no longer accepting Account Requests.
To view the new OWASP Foundation website, please visit https://owasp.org
OWASP Periodic Table of Vulnerabilities - SOAP Array Abuse, XML Attribute Blowup, XML Entity Expansion
From OWASP
Revision as of 20:15, 22 July 2013 by James Landis (talk | contribs) (Created page with "Return to Periodic Table Working View == SOAP Array Abuse, XML Attribute Blowup, XML Entity Expa...")
Return to Periodic Table Working View
[hide]
SOAP Array Abuse, XML Attribute Blowup, XML Entity Expansion
Root Cause Summary
Some features of the XML specification can be abused if XML parsers do not safely handle recursive element definitions or array declarations.
Browser / Standards Solution
None
Perimeter Solution
Perimeter technologies should perform strict schema validation against all incoming XML documents. The validation process should enforce the following configurable limits on XML object definitions:
- The maximum array size (as a product of the number of rows and columns)
- The maximum number of elements
- The maximum number of attributes per element
- The maximum size of entity definitions
- The maximum number of references to entity definitions
Generic Framework Solution
None
Custom Framework Solution
None
Custom Code Solution
None
Discussion / Controversy
None
References
SOAP Array Abuse (WASC)
XML Attribute Blowup (WASC)
XML Entity Expansion (WASC)