About | Contact Us | Register | Login
ProceedingsSeriesJournalsSearchEAI
Security and Privacy in Communication Networks. 17th EAI International Conference, SecureComm 2021, Virtual Event, September 6–9, 2021, Proceedings, Part II

Research Article

XHunter: Understanding XXE Vulnerability via Automatic Analysis

Download(Requires a free EAI acccount)
3 downloads
Cite
BibTeX Plain Text
  • @INPROCEEDINGS{10.1007/978-3-030-90022-9_2,
        author={Zhenhua Wang and Wei Xie and Jing Tao and Yong Tang and Enze Wang},
        title={XHunter: Understanding XXE Vulnerability via Automatic Analysis},
        proceedings={Security and Privacy in Communication Networks. 17th EAI International Conference, SecureComm 2021, Virtual Event, September 6--9, 2021, Proceedings, Part II},
        proceedings_a={SECURECOMM PART 2},
        year={2021},
        month={11},
        keywords={Static analysis Web security XML external entity Vulnerability ranking},
        doi={10.1007/978-3-030-90022-9_2}
    }
    
  • Zhenhua Wang
    Wei Xie
    Jing Tao
    Yong Tang
    Enze Wang
    Year: 2021
    XHunter: Understanding XXE Vulnerability via Automatic Analysis
    SECURECOMM PART 2
    Springer
    DOI: 10.1007/978-3-030-90022-9_2
Zhenhua Wang1, Wei Xie1,*, Jing Tao1, Yong Tang1, Enze Wang1
  • 1: College of Computer, National University of Defense Technology
*Contact email: xiewei@nudt.edu.cn

Abstract

XXE vulnerability is a severe cybersecurity threat. OWASP listed the 10 most serious web application security risks, and XXE ranked fourth. This vulnerability can lead to sensitive information leakage, DoS attacks, and intranet asset discovery. Little attention has been given to this problem, and manual work is still needed to detect these vulnerabilities. Here, we design a penetration test framework, XHunter, to discover and exploit XXE vulnerabilities automatically. XHunter can find the call chain that triggers a vulnerability and determine the vulnerability’s influence scope. Specifically, our work addresses many challenges in the analysis of modern web applications, such as object-oriented structures. In addition to detecting vulnerable sinks, we find the exploit path automatically. We give each vulnerability a risk rating based on the potential impact of the exploits. In this paper, we analyze 22 real-world web frameworks and find 8 unreported vulnerabilities, 2 of which have obtained CVE IDs.

Keywords
Static analysis Web security XML external entity Vulnerability ranking
Published
2021-11-04
Appears in
SpringerLink
http://dx.doi.org/10.1007/978-3-030-90022-9_2
Copyright © 2021–2025 ICST
EBSCOProQuestDBLPDOAJPortico
EAI Logo

About EAI

  • Who We Are
  • Leadership
  • Research Areas
  • Partners
  • Media Center

Community

  • Membership
  • Conference
  • Recognition
  • Sponsor Us

Publish with EAI

  • Publishing
  • Journals
  • Proceedings
  • Books
  • EUDL