CAPEC-229: Serialized Data Parameter Blowup

Detailed Draft 严重程度: High 攻击可能性: High

CAPEC版本: 3.9

更新日期: 2023-01-24

攻击模式描述

This attack exploits certain serialized data parsers (e.g., XML, YAML, etc.) which manage data in an inefficient manner. The attacker crafts an serialized data file with multiple configuration parameters in the same dataset. In a vulnerable parser, this results in a denial of service condition where CPU resources are exhausted because of the parsing algorithm. The weakness being exploited is tied to parser implementation and not language specific.

执行流程

步骤 1 Explore

[Survey the target] Using a browser or an automated tool, an attacker records all instances of web services to process requests using serialized data.

技术:
  • Use an automated tool to record all instances of URLs to process requests from serialized data.
  • Use a browser to manually explore the website and analyze how the application processes requests using serialized data.
步骤 2 Exploit

[Launch a Blowup attack] The attacker crafts malicious messages that contain multiple configuration parameters in the same dataset.

技术:
  • Send the malicious crafted message containing the multiple configuration parameters to the target URL, causing a denial of service.

前提条件

  • The server accepts input in the form of serialized data and is using a parser with a runtime longer than O(n) for the insertion of a new configuration parameter in the data container.(examples are .NET framework 1.0 and 1.1)

缓解措施

This attack may be mitigated completely by using a parser that is not using a vulnerable container.

Mitigation may limit the number of configuration parameters per dataset.

分类映射

分类名称 条目ID 条目名称
WASC 41 XML Attribute Blowup
关键信息

CAPEC ID: CAPEC-229

抽象级别: Detailed

状态: Draft

典型严重程度: High

攻击可能性: High

相关攻击模式
相关CWE弱点