About XML Quadratic Blowup Attack:
An XML quadratic blowup attack is similar to a Billion Laughs attack
(http://en.wikipedia.org/wiki/Billion_laughs). Essentially, it exploits the use of entity expansion. Instead of deferring to the use of nested entities, it replicates one large entity using a couple thousand characters repeatedly.
A medium-sized XML document of approximately two hundred kilobytes may require anywhere within the range of one hundred MB to several GB of memory. When the attack is combined with a particular level of nested expansion, an attacker is then able to achieve a higher ratio of success.
- See more at: http://www.breaksec.com/?p=6362#sthash.05DoTigI.dpuf
<?xml version=”1.0″?>
<!DOCTYPE DoS [
<!ENTITY a "xxxxxxxxxxxxxxxxx...">
]>
<DoS>&x;&x;&x;&x;&x;&x;&x;&x;&x;…</DoS>
- See more at: http://www.breaksec.com/?p=6362#sthash.05DoTigI.dpuf
Exploit:
http://cxsecurity.com/issue/WLB-2014080046