[Survey the target] An adversary determines the input data stream that is being processed by a data parser that supports using subsitituion on the victim's side.
[Craft malicious payload] The adversary crafts a malicious message containing nested exponential expansion that completely uses up available server resources. See the "Example Instances" section for details on how to craft this malicious payload.
[Send the message] Send the malicious crafted message to the target URL.
| Weakness Name | |
|---|---|
| CWE-770 | Allocation of Resources Without Limits or Throttling The product allocates a reusable resource or group of resources on behalf of an actor without imposing any intended restrictions on the size or number of resources that can be allocated. | 
| CWE-776 | Improper Restriction of Recursive Entity References in DTDs ('XML Entity Expansion') The product uses XML documents and allows their structure to be defined with a Document Type Definition (DTD), but it does not properly control the number of recursive definitions of entities. | 
| Name | Organization | Date | Date release | 
|---|---|---|---|
| CAPEC Content Team | The MITRE Corporation | 
| Name | Organization | Date | Comment | 
|---|---|---|---|
| CAPEC Content Team | The MITRE Corporation | Updated Resources_Required | |
| CAPEC Content Team | The MITRE Corporation | Updated References | |
| CAPEC Content Team | The MITRE Corporation | Updated Mitigations | |
| CAPEC Content Team | The MITRE Corporation | Updated Related_Attack_Patterns, Taxonomy_Mappings | |
| CAPEC Content Team | The MITRE Corporation | Updated @Name, Alternate_Terms, Description, Example_Instances, Execution_Flow, Mitigations, Prerequisites, Related_Weaknesses, Skills_Required | |
| CAPEC Content Team | The MITRE Corporation | Updated Execution_Flow | |
| CAPEC Content Team | The MITRE Corporation | Updated Example_Instances |