CAPEC 528 XML Flood

Draft Standard Low Risk
Severity Medium

Description

An adversary may execute a flooding attack using XML messages with the intent to deny legitimate users access to a web service. These attacks are accomplished by sending a large number of XML based requests and letting the service attempt to parse each one. In many cases this type of an attack will result in a XML Denial of Service (XDoS) due to an application becoming unstable, freezing, or crashing.

Attack Execution Flow

3

Mitigations

2

Consequences

Indicators

1

Relationships

Related ATT&CK Techniques

2