Automatic Generation of Tests to Exploit XML Injection Vulnerabilities in Web Applications

Journal Article (2019)
Author(s)

Sadeeq Jan (Université du Luxembourg, University of Engineering and Technology, Peshawar)

Annibale Panichella (Université du Luxembourg)

Andrea Arcuri (Université du Luxembourg, Westerdals Oslo School of Arts, Communication and Technology)

Lionel Briand (Université du Luxembourg)

Affiliation
External organisation
DOI related publication
https://doi.org/10.1109/TSE.2017.2778711
More Info
expand_more
Publication Year
2019
Language
English
Affiliation
External organisation
Issue number
4
Volume number
45
Pages (from-to)
335-362

Abstract

Modern enterprise systems can be composed of many web services (e.g., SOAP and RESTful). Users of such systems might not have direct access to those services, and rather interact with them through a single entry point which provides a GUI (e.g., a web page or a mobile app). Although the interactions with such entry point might be secure, a hacker could trick such systems to send malicious inputs to those internal web services. A typical example is XML injection targeting SOAP communications. Previous work has shown that it is possible to automatically generate such kind of attacks using search-based techniques. In this paper, we improve upon previous results by providing more efficient techniques to generate such attacks. In particular, we investigate four different algorithms and two different fitness functions. A large empirical study, involving also two industrial systems, shows that our technique is effective at automatically generating XML injection attacks.

No files available

Metadata only record. There are no files for this record.