Nature | Type | ID | Name |
---|---|---|---|
ChildOf | S | 231 | Oversized Serialized Data Payloads |
Survey the target
Using a browser or an automated tool, an attacker records all instances of web services to process requests using serialized data.
Technique |
---|
Use an automated tool to record all instances of URLs to process requests from serialized data. |
Use a browser to manually explore the website and analyze how the application processes requests using serialized data. |
Launch a Blowup attack
The attacker crafts malicious messages that contain multiple configuration parameters in the same dataset.
Technique |
---|
Send the malicious crafted message containing the multiple configuration parameters to the target URL, causing a denial of service. |
Scope | Likelihood | Impact | Note |
---|
Taxonomy Name | Entry ID | Entry Name |
---|---|---|
WASC | 41 | XML Attribute Blowup |