XML Injection (aka Blind XPath Injection) |
Weakness ID: 91 (Weakness Base) | Status: Draft |
Description Summary
The software does not properly filter or quote special characters or reserved words that are used in XML, allowing attackers to modify the syntax, content, or commands of the XML before it is processed by an end system.
Assume all input is malicious. Use an appropriate combination of black lists and white lists to ensure only valid and expected input is processed by the system. |
Nature | Type | ID | Name | View(s) this relationship pertains to |
---|---|---|---|---|
ChildOf | Weakness Class | 74 | Failure to Sanitize Data into a Different Plane ('Injection') | Development Concepts (primary)699 Research Concepts (primary)1000 |
ChildOf | Category | 713 | OWASP Top Ten 2007 Category A2 - Injection Flaws | Weaknesses in OWASP Top Ten (2007) (primary)629 |
ChildOf | Category | 727 | OWASP Top Ten 2004 Category A6 - Injection Flaws | Weaknesses in OWASP Top Ten (2004) (primary)711 |
ParentOf | Weakness Base | 643 | Failure to Sanitize Data within XPath Expressions ('XPath injection') | Development Concepts (primary)699 Research Concepts (primary)1000 |
ParentOf | Weakness Base | 652 | Failure to Sanitize Data within XQuery Expressions ('XQuery Injection') | Development Concepts (primary)699 Research Concepts (primary)1000 |
Under-reported. This is likely found regularly by third party code auditors, but there are very few publicly reported examples. |
In vulnerability theory terms, this is a representation-specific case of a Data/Directive Boundary Error. |
Mapped Taxonomy Name | Node ID | Fit | Mapped Node Name |
---|---|---|---|
PLOVER | XML injection (aka Blind Xpath injection) | ||
OWASP Top Ten 2007 | A2 | CWE More Specific | Injection Flaws |
OWASP Top Ten 2004 | A6 | CWE More Specific | Injection Flaws |
WASC | 23 | XML Injection |
CAPEC-ID | Attack Pattern Name | (CAPEC Version: 1.4) |
---|---|---|
83 | XPath Injection |
Amit Klein. "Blind XPath Injection". 2004-05-19. <http://www.modsecurity.org/archive/amit/blind-xpath-injection.pdf>. |
The description for this entry is generally applicable to XML, but the name includes "blind XPath injection" which is more closely associated with CWE-643. Therefore this entry might need to be deprecated or converted to a general category - although injection into raw XML is not covered by CWE-643 or CWE-652. |
Submissions | ||||
---|---|---|---|---|
Submission Date | Submitter | Organization | Source | |
PLOVER | Externally Mined | |||
Modifications | ||||
Modification Date | Modifier | Organization | Source | |
2008-07-01 | Eric Dalci | Cigital | External | |
updated Time of Introduction | ||||
2008-08-15 | Veracode | External | ||
Suggested OWASP Top Ten 2004 mapping | ||||
2008-09-08 | CWE Content Team | MITRE | Internal | |
updated Relationships, Other Notes, Taxonomy Mappings | ||||
2008-10-14 | CWE Content Team | MITRE | Internal | |
updated Maintenance Notes, Other Notes, Theoretical Notes |