This site is the archived OWASP Foundation Wiki and is no longer accepting Account Requests.
To view the new OWASP Foundation website, please visit https://owasp.org

Reviewing Web Services

From OWASP
Revision as of 14:16, 26 September 2008 by EoinKeary (talk | contribs) (New page: ===Reviewing Webservices and XML payloads=== When reviewing webservices one should focus firstly on the generic security controls related to any application. Webservices also have some uni...)

(diff) ← Older revision | Latest revision (diff) | Newer revision → (diff)
Jump to: navigation, search

Reviewing Webservices and XML payloads

When reviewing webservices one should focus firstly on the generic security controls related to any application. Webservices also have some uniques controls should be looked at.


XMLL Schema : Input validation

Schemas are used to ensure that the XML payload received is within defined and expected limits. They can be specific to a list of known good values or simply define lenght and type. Some XML applications do not have a schema implemented which may mean input validation is perfromed downstream ot even not at all!!


The schema can specify a finite amount of parameters, the expected parameters in the XML payload alongside the expected types and values of the payload data:

The ProcessContents attribute indicates how XML from other namespaces should be validated. The value for this attribute may be

  • strict: There must be a declaration associated with the namespace and validate the XML.
  • lax There should attempt to validate the XML against its schema.
  • skip There is no attempt to validate the XML.
processContents=skip\lax\skip