TE
TechEcho
Home24h TopNewestBestAskShowJobs
GitHubTwitter
Home

TechEcho

A tech news platform built with Next.js, providing global tech news and discussions.

GitHubTwitter

Home

HomeNewestBestAskShowJobs

Resources

HackerNews APIOriginal HackerNewsNext.js

© 2025 TechEcho. All rights reserved.

XML flaws threaten 'enormous' array of apps

24 pointsby mindhackeralmost 16 years ago

9 comments

tow21almost 16 years ago
Poorly written XML parsers (and I've written my fair share) are always open to DOS attacks; XML has no upper bound on element names, attribute value length, stack depth ...<p><a href="http://en.wikipedia.org/wiki/Billion_laughs" rel="nofollow">http://en.wikipedia.org/wiki/Billion_laughs</a><p>Same is mostly true of JSON parsers as well of course.<p>If you let potentially hostile users feed arbitrary data into any of these, even a totally non-buggy, perfectly conformant parser is wide-open to being abused via DOS.
评论 #745286 未加载
评论 #745337 未加载
评论 #745457 未加载
bsaunderalmost 16 years ago
Here's the original press release from the company:<p><a href="http://www.codenomicon.com/news/press-releases/2009-08-05.shtml" rel="nofollow">http://www.codenomicon.com/news/press-releases/2009-08-05.sh...</a><p>And a CERT-FI advisory:<p><a href="http://www.cert.fi/en/reports/2009/vulnerability2009085.html" rel="nofollow">http://www.cert.fi/en/reports/2009/vulnerability2009085.html</a><p>Also the expat-bug and expat-discuss mailing lists were very active in January/February with seemly related issues:<p><a href="http://mail.libexpat.org/pipermail/expat-bugs/2009-January/thread.html" rel="nofollow">http://mail.libexpat.org/pipermail/expat-bugs/2009-January/t...</a><p><a href="http://mail.libexpat.org/pipermail/expat-discuss/2009-February/thread.html" rel="nofollow">http://mail.libexpat.org/pipermail/expat-discuss/2009-Februa...</a>
jcromartiealmost 16 years ago
The original article sounds like a scare/marketing piece:<p><pre><code> "Targets: Anything that uses XML"</code></pre>
DanielStraightalmost 16 years ago
Pretty much a useless article without some explanation of what the flaw is.
评论 #745649 未加载
sixpoint8almost 16 years ago
So then there is nothing wrong with XML… There is everything wrong with a few parsers.<p>Wouldn't a better title be "XML Parser Flaws Doom Computing World"?
cemaalmost 16 years ago
Because of the nature of the flaw, details have not been published. (Also see the original article at <a href="http://www.codenomicon.com/labs/xml/" rel="nofollow">http://www.codenomicon.com/labs/xml/</a>) Not clear what can be done about the issue, and how bad the issue is. Should we just wait for it to be resolved?
sgoransonalmost 16 years ago
Pretty skeptical this flaw could be in "virtually every open-source XML library available". Seems unlikely a million brains collectively missed whatever this is.
评论 #745354 未加载
评论 #745630 未加载
jeroenalmost 16 years ago
"xml parser flaws"
tybrisalmost 16 years ago
Unless they can trigger an infinite loop I'm not really worried about Java/Python based web services being affected. Any exception should be caught on a per-request basis.