CAPEC 228 DTD Injection

Draft Detailed Unknown Risk
Severity Medium

Description

An attacker injects malicious content into an application's DTD in an attempt to produce a negative technical impact. DTDs are used to describe how XML documents are processed. Certain malformed DTDs (for example, those with excessive entity expansion as described in CAPEC 197) can cause the XML parsers that process the DTDs to consume excessive resources resulting in resource depletion.

Attack Execution Flow

3

Mitigations

3

Consequences

Relationships