Title :
Known XML Vulnerabilities Are Still a Threat to Popular Parsers and Open Source Systems
Author :
Sadeeq Jan;Cu D. Nguyen;Lionel Briand
Author_Institution :
Interdiscipl. Centre for Security, Reliability &
Abstract :
The Extensible Markup Language (XML) is extensively used in software systems and services. Various XML-based attacks, which may result in sensitive information leakage or denial of services, have been discovered and published. However, due to development time pressures and limited security expertise, such attacks are often overlooked in practice. In this paper, following a rigorous and extensive experimental process, we study the presence of two types of XML-based attacks: BIL and XXE in 13 popular XML parsers. Furthermore, we investigate whether open-source systems that adopt a vulnerable XML parser apply any mitigation to prevent such attacks. Our objective is to provide clear and solid scientific evidence about the extent of the threat associated with such XML-based attacks and to discuss the implications of the obtained results. Our conclusion is that most of the studied parsers are vulnerable and so are systems that use them. Such strong evidence can be used to raise awareness among software developers and is a strong motivation for developers to provide security measures to thwart BIL and XXE attacks before deployment when adopting existing XML parsers.
Keywords :
"XML","Web services","Java","Weapons","Security","Google","Memory management"
Conference_Titel :
Software Quality, Reliability and Security (QRS), 2015 IEEE International Conference on
DOI :
10.1109/QRS.2015.42