Skip to main content
CUI

Documentation - V-222593

V-222593

Application Security and Development Security Technical Implementation Guide

CAT II

Title

XML-based applications must mitigate DoS attacks by using XML filters, parser options, or gateways.

Description

<VulnDiscussion>DoS is a condition when a resource is not available for legitimate users. When this occurs, the organization either cannot accomplish its mission or must operate at degraded capacity. XML-based applications are susceptible to DoS attacks due to the nature of XML parsing being processor intensive and complicated. Best practice for parsing XML to avoid DoS include: - Using a proven XML parser - Using an XML gateway that provides DoS protection - Using parser options that provide...

Fix Text (Documentation Requirement)

Implement: - Validation against recursive payloads - Validation against oversized payloads - Protection against XML entity expansion - Validation against overlong element names - Optimized configuration for maximum message throughput in order to ensure DoS attacks against web services are limited.

Documentation Status

Cancel
CUI