CAPEC 250 XML Injection

Draft Standard High Risk

Description

An attacker utilizes crafted XML user-controllable input to probe, attack, and inject data into the XML database, using techniques similar to SQL injection. The user-controllable input can allow for unauthorized viewing of data, bypassing authentication or the front-end application for direct XML database access, and possibly altering database information.

Attack Execution Flow

3

Mitigations

2

Consequences

Indicators

1

Relationships

Resources Required

1