XML Injection Attack

From Guidance Share
Jump to navigationJump to search

Description

Attacker builds XML from malicious input. (check xpath injection attacks)


Vulnerabilities

  • Inappropriate or lacking schema validation
  • Dynamic XML generation using untrusted input


Countermeasures

  • Validate schema against a defined XSD
  • Perform context-sensitive encoding of untrusted input using an encoding library (e.g., IOSec)
  • Untrusted input should be validated against an inclusion list before use (e.g., RegEx pattern, primitive type casting, domain constraint, etc.)