Sign Up

Sign Up to our social questions and Answers Engine to ask questions, answer people’s questions, and connect with other people.

Have an account? Sign In

Have an account? Sign In Now

Sign In

Login to our social questions & Answers Engine to ask questions answer people’s questions & connect with other people.

Sign Up Here

Forgot Password?

Don't have account, Sign Up Here

Forgot Password

Lost your password? Please enter your email address. You will receive a link and will create a new password via email.

Have an account? Sign In Now

You must login to ask a question.

Forgot Password?

Need An Account, Sign Up Here

Please briefly explain why you feel this question should be reported.

Please briefly explain why you feel this answer should be reported.

Please briefly explain why you feel this user should be reported.

Sign InSign Up

The Archive Base

The Archive Base Logo The Archive Base Logo

The Archive Base Navigation

  • SEARCH
  • Home
  • About Us
  • Blog
  • Contact Us
Search
Ask A Question

Mobile menu

Close
Ask a Question
  • Home
  • Add group
  • Groups page
  • Feed
  • User Profile
  • Communities
  • Questions
    • New Questions
    • Trending Questions
    • Must read Questions
    • Hot Questions
  • Polls
  • Tags
  • Badges
  • Buy Points
  • Users
  • Help
  • Buy Theme
  • SEARCH
Home/ Questions/Q 494999
In Process

The Archive Base Latest Questions

Editorial Team
  • 0
Editorial Team
Asked: May 13, 20262026-05-13T05:33:06+00:00 2026-05-13T05:33:06+00:00

xml has been the backbone of the service oriented application(SOA) and it will be

  • 0

xml has been the backbone of the service oriented application(SOA) and it will be a useful one in the coming future.
As xml is easy , flexible, it can be easily made vulnerable and the attackers can use it for their own purpose.
As such some of the attacks by are coercive parsing attack, xml external entity(XEE) attack, xml dos(xdos) attack, xml bombs.
can any one tell in detail about these attacks.
how could one can simulate these attacks practically in a single system?

  • 1 1 Answer
  • 0 Views
  • 0 Followers
  • 0
Share
  • Facebook
  • Report

Leave an answer
Cancel reply

You must login to add an answer.

Forgot Password?

Need An Account, Sign Up Here

1 Answer

  • Voted
  • Oldest
  • Recent
  • Random
  1. Editorial Team
    Editorial Team
    2026-05-13T05:33:06+00:00Added an answer on May 13, 2026 at 5:33 am

    First we need to distinguish the effect of attack from the feature that is exploited.

    Particular features of XML that can be exploited are

    • XML entities
    • Proprietary extension of parser and validator
    • Cyclic/recursive references
    • Remote access

    The effects can be either

    • DOS
    • Information disclosure

    I don’t think there is percise definition of a “bomb”, but it refers to an attack that is particularly “compact” and which “expands”. A “coercive parsing attack” exploits the nature of the XML model to overwhelm the parser.

    The examples below are taken from XML Denial of Service Attacks and Defenses.
    Also, if you understand french, read the excellent magazine “La security des web services“.

    Example 1

    A bomb using entities which result in a DOS because it exhausts the memory

    <?xml version="1.0"?>
    <!DOCTYPE kaboom [
      <!ENTITY a "aaaaaaaaaaaaaaaaaa...">
    ]>
    <kaboom>&a;&a;&a;&a;&a;&a;&a;&a;&a;...</kaboom>
    

    If you have 50’000 “aaaa…aaa” and 50’0000 &a:&a;...&a;, a payload of 200KB expands to more than 2GB in memory

    Example 2

    An entity could be used to access another file in a unauthorized way. This leads to information disclosure.

    <?xml version="1.0"?>
    <!DOCTYPE letter [
         <!ENTITY file SYSTEM "/sensitive.txt" >
    ]>
    <tag> &file; </tag>
    

    Example 3

    Using the ability of certain parser to access remote resources (see http://www.ibm.com/developerworks/xml/library/x-tipgentity.html), now go figure what happens if the file bigfile.xml is 2GB. This probably leads to a DOS.

    <?xml version="1.0"?>
    <!DOCTYPE letter [
         <!ENTITY file  SYSTEM "http://www.mysite.com/bigfile.xml" >
    ]>
    <tag> &file; </tag>
    

    Example 4

    This recursion will lead to memory exhaust and probably a DOS.

    <!ENTITY companyname "Contoso Inc.">
    <!ENTITY divisionname "&companyname; Web Products Division">
    

    If this is schoolwork, then you should also think about how you can protect yourself from such attack.

    • 0
    • Reply
    • Share
      Share
      • Share on Facebook
      • Share on Twitter
      • Share on LinkedIn
      • Share on WhatsApp
      • Report

Sidebar

Related Questions

I'd like my WCF service to return an xml file that has been signed.
I've been reading that Adobe has made crossdomain.xml stricter in flash 9-10 and I'm
sometimes it feels like XML has been used just because it was fashionable.
Apparently, BDB-XML has been around since at least 2003 but I only recently stumbled
The build.xml has a test and a build target. The test target obviously depends
I have an xml that has text within word elements e.g <word>Police</word> <word>confirmed</word> <word>they
I have a bunch of XML that has lines that look like this <_char
NDoc has an XML element inheritdoc which allows you to inherit documentation of a
I have an xml and it has nodes with i:nil=true in it. What does
I am selecting from a table that has an XML column using T-SQL. I

Explore

  • Home
  • Add group
  • Groups page
  • Communities
  • Questions
    • New Questions
    • Trending Questions
    • Must read Questions
    • Hot Questions
  • Polls
  • Tags
  • Badges
  • Users
  • Help
  • SEARCH

Footer

© 2021 The Archive Base. All Rights Reserved
With Love by The Archive Base

Insert/edit link

Enter the destination URL

Or link to existing content

    No search term specified. Showing recent items. Search or use up and down arrow keys to select an item.