| Home > CAPEC List > CAPEC-231: Oversized Serialized Data Payloads (Version 3.9) |
|
Applications often need to transform data in and out of serialized data formats, such as XML and YAML, by using a data parser. It may be possible for an adversary to inject data that may have an adverse effect on the parser when it is being processed. By supplying oversized payloads in input vectors that will be processed by the parser, an adversary can cause the parser to consume more resources while processing, causing excessive memory consumption and CPU utilization, and potentially cause execution of arbitrary code. An adversary's goal is to leverage parser failure to their advantage. DoS is most closely associated with web services, SOAP, and Rest, because remote service requesters can post malicious data payloads to the service provider designed to exhaust the service provider's memory, CPU, and/or disk space. This attack exploits the loosely coupled nature of web services, where the service provider has little to no control over the service requester and any messages the service requester sends.
Term: XML Denial of Service (XML DoS)
Medium
High
| Nature | Type | ID | Name |
|---|---|---|---|
| ChildOf | Meta Attack PatternMeta Attack Pattern - A meta level attack pattern in CAPEC is a decidedly abstract characterization of a specific methodology or technique used in an attack. A meta attack pattern is often void of a specific technology or implementation and is meant to provide an understanding of a high level approach. A meta level attack pattern is a generalization of related group of standard level attack patterns. Meta level attack patterns are particularly useful for architecture and design level threat modeling exercises. | 130 | Excessive Allocation |
| ParentOf | Detailed Attack PatternDetailed Attack Pattern - A detailed level attack pattern in CAPEC provides a low level of detail, typically leveraging a specific technique and targeting a specific technology, and expresses a complete execution flow. Detailed attack patterns are more specific than meta attack patterns and standard attack patterns and often require a specific protection mechanism to mitigate actual attacks. A detailed level attack pattern often will leverage a number of different standard level attack patterns chained together to accomplish a goal. | 221 | Data Serialization External Entities Blowup |
| ParentOf | Detailed Attack PatternDetailed Attack Pattern - A detailed level attack pattern in CAPEC provides a low level of detail, typically leveraging a specific technique and targeting a specific technology, and expresses a complete execution flow. Detailed attack patterns are more specific than meta attack patterns and standard attack patterns and often require a specific protection mechanism to mitigate actual attacks. A detailed level attack pattern often will leverage a number of different standard level attack patterns chained together to accomplish a goal. | 229 | Serialized Data Parameter Blowup |
| View Name | Top Level Categories |
|---|---|
| Domains of Attack | Software |
| Mechanisms of Attack | Abuse Existing Functionality |
| Scope | Impact | Likelihood |
|---|---|---|
Availability | Resource Consumption | |
Confidentiality | Read Data | |
Confidentiality Integrity Availability | Execute Unauthorized Commands | |
Confidentiality Access Control Authorization | Gain Privileges |
| CWE-ID | Weakness Name |
|---|---|
| 112 | Missing XML Validation |
| 20 | Improper Input Validation |
| 674 | Uncontrolled Recursion |
| 770 | Allocation of Resources Without Limits or Throttling |
Other
Other
| Submissions | |||
|---|---|---|---|
| Submission Date | Submitter | Organization | |
| 2014年06月23日 (Version 2.6) | CAPEC Content Team | The MITRE Corporation | |
| Modifications | |||
| Modification Date | Modifier | Organization | |
| 2019年09月30日 (Version 3.2) | CAPEC Content Team | The MITRE Corporation | |
| Updated Alternate_Terms, Description, Execution_Flow, Related_Attack_Patterns | |||
| 2020年07月30日 (Version 3.3) | CAPEC Content Team | The MITRE Corporation | |
| Updated @Name, Description, Execution_Flow, Indicators, Mitigations, Prerequisites | |||
| 2020年12月17日 (Version 3.4) | CAPEC Content Team | The MITRE Corporation | |
| Updated Description, Notes | |||
| 2021年06月24日 (Version 3.5) | CAPEC Content Team | The MITRE Corporation | |
| Updated Related_Weaknesses | |||
| 2022年09月29日 (Version 3.8) | CAPEC Content Team | The MITRE Corporation | |
| Updated Description, Extended_Description | |||
| Previous Entry Names | |||
| Change Date | Previous Entry Name | ||
| 2020年07月30日 (Version 3.3) | XML Oversized Payloads | ||
|
Use of the Common Attack Pattern Enumeration and Classification (CAPEC), and the associated references from this website are subject to the Terms of Use. Copyright © 2007–2025, The MITRE Corporation. CAPEC and the CAPEC logo are trademarks of The MITRE Corporation. |
||