Nature | Type | ID | Name |
---|---|---|---|
ChildOf | S | 230 | Serialized Data with Nested Payloads |
CanFollow | D | 228 | DTD Injection |
Survey the target
An adversary determines the input data stream that is being processed by a data parser that supports using substituion on the victim's side.
Technique |
---|
Use an automated tool to record all instances of URLs to process requests. |
Use a browser to manually explore the website and analyze how the application processes requests. |
Craft malicious payload
The adversary crafts malicious message containing nested quadratic expansion that completely uses up available server resource.
Technique |
---|
Send the message
Send the malicious crafted message to the target URL.
Technique |
---|
Scope | Likelihood | Impact | Note |
---|---|---|---|
Availability | N/A | Unreliable ExecutionResource Consumption | Denial of Service |
Taxonomy Name | Entry ID | Entry Name |
---|