8.10 XML External Entities

Select > Reports > Portal > Repository > Standard Content > OWASP > A 4 - XML External Entities.

Older or misconfigured XML processors use XML documents to evaluate external entity references, and can inadvertently process harmful XML input. Malicious users the XML processor’s to reveal internal content such as files, file shares, and port scans, as well as execute remote code and denial-of-service attacks.

To watch for XML external entity attacks, use the following report and dashboard.

XML Vulnerabilities

Lists the hosts with the most XML vulnerabilities.

XML Vulnerabilities Overview

Provides charts and a table to help you identify the systems with the most XML vulnerabilities as well as the most reported vulnerabilities. You can review the vulnerabilities by severity and risk indicator.