CAPEC Details
Name DTD Injection
Likelyhood of attack Typical severity
High Medium
Summary An attacker injects malicious content into an application's DTD in an attempt to produce a negative technical impact. DTDs are used to describe how XML documents are processed. Certain malformed DTDs (for example, those with excessive entity expansion as described in CAPEC 197) can cause the XML parsers that process the DTDs to consume excessive resources resulting in resource depletion.
Prerequisites The target must be running an XML based application that leverages DTDs.
Execution Flow
Step Phase Description Techniques
1 Explore [Survey the target] Using a browser or an automated tool, an attacker records all instances of web services to process XML requests.
  • Use an automated tool to record all instances of URLs to process XML requests.
  • Use a browser to manually explore the website and analyze how the application processes XML requests.
2 Explore [Determine use of XML with DTDs] Examine application input to identify XML input that leverage the use of one or more DTDs.
  • Examine any available documentation for the application that discusses expected XML input.
  • Exercise the application using XML input with and without a DTD specified. Failure without DTD likely indicates use of DTD.
3 Exploit [Craft and inject XML containg malicious DTD payload]
  • Inject XML expansion attack that creates a Denial of Service impact on the targeted server using its DTD.
  • Inject XML External Entity (XEE) attack that can cause the disclosure of confidential information, execute abitrary code, create a Denial of Service of the targeted server, or several other malicious impacts.
Solutions Design: Sanitize incoming DTDs to prevent excessive expansion or other actions that could result in impacts like resource depletion. Implementation: Disallow the inclusion of DTDs as part of incoming messages. Implementation: Use XML parsing tools that protect against DTD attacks.
Related Weaknesses
CWE ID Description
CWE-829 Inclusion of Functionality from Untrusted Control Sphere
Related CAPECS
CAPEC ID Description
CAPEC-197 An attacker submits an XML document to a target application where the XML document uses nested entity expansion to produce an excessively large output XML. XML allows the definition of macro-like structures that can be used to simplify the creation of complex structures. However, this capability can be abused to create excessive demands on a processor's CPU and memory. A small number of nested expansions can result in an exponential growth in demands on memory.
CAPEC-250 An attacker utilizes crafted XML user-controllable input to probe, attack, and inject data into the XML database, using techniques similar to SQL injection. The user-controllable input can allow for unauthorized viewing of data, bypassing authentication or the front-end application for direct XML database access, and possibly altering database information.
CAPEC-491 An adversary exploits a few properties of XML(substitution entities and inline DTDs) to cause a denial of service situation due to excessive memory being allocated to fully expand the XML. The result of this denial of service could cause the application to freeze or crash.