Nytro Posted November 6, 2014 Report Posted November 6, 2014 XML Schema, DTD, and Entity AttacksMay 19, 2014Version 1.0Timothy D. Morgan (@ecbftw)Omar Al Ibrahim (oalibrahim@vsecurity.com)ContentsAbstract...............................................................................................................................................................................3Introduction........................................................................................................................................................................4Motivation............................................................................................................................................................................................................. 4Background........................................................................................................................................................................................................... 4Prior Art................................................................................................................................................................................................................ 5General Techniques...........................................................................................................................................................6Resource Inclusion via External Entities........................................................................................................................................................ 6URL Invocation.................................................................................................................................................................................................... 7Parameter Entities.............................................................................................................................................................................................. 9External Resource Inclusion via XInclude Support................................................................................................................................... 12Denial of Service Attacks................................................................................................................................................................................ 13Implementation-Specific Techniques and Limitations.............................................................................................15Java / Xerces...................................................................................................................................................................................................... 15C# / .NET........................................................................................................................................................................................................... 19Expat.................................................................................................................................................................................................................... 24Libxml2................................................................................................................................................................................................................ 25PHP...................................................................................................................................................................................................................... 26Python................................................................................................................................................................................................................. 28Ruby..................................................................................................................................................................................................................... 28Recommendations For Developers............................................................................................................................29Java / Xerces...................................................................................................................................................................................................... 29C# / .NET........................................................................................................................................................................................................... 30Expat.................................................................................................................................................................................................................... 32Libxml2................................................................................................................................................................................................................ 32PHP...................................................................................................................................................................................................................... 32Python................................................................................................................................................................................................................. 32Ruby..................................................................................................................................................................................................................... 33Recommendations For XML Library Implementors..............................................................................................33Future Work.....................................................................................................................................................................34Acknowledgements........................................................................................................................................................34References........................................................................................................................................................................35Download:http://vsecurity.com/download/papers/XMLDTDEntityAttacks.pdf Quote