Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

XML External Entity Reference (XXE) (CWE-611)

 

CWE-611 describes XXE Injection as follows:

...

Attacks can include disclosing local files, which may contain sensitive data such as passwords or private user data. Since the attack occurs relative to the application processing the XML document, an attacker may use this trusted application to pivot to other internal systems, possibly disclosing other internal content via http(s) requests or launching a CSRF attack to any unprotected internal services. In some situations, an XML processor library that is vulnerable to client-side memory corruption issues may be exploited by dereferencing a malicious URI, possibly allowing arbitrary code execution under the application account. Other attacks can access local resources that may not stop returning data, possibly impacting application availability if too many threads or processes are not released.

 

XXE (CWE-611) coverage by Kiuwan

 

In Kiuwan, you can search rules covering XXE (CWE-611) filtering by Vulnerability Type (“Injection”) and/or by CWE tag (“CWE:611”). 

...