Description
The product does not handle or incorrectly handles a compressed input with a very high compression ratio that produces a large output.
An example of data amplification is a "decompression bomb," a small ZIP file that can produce a large amount of data when it is decompressed.
Potential Impact
Availability
DoS: Amplification, DoS: Crash, Exit, or Restart, DoS: Resource Consumption (CPU), DoS: Resource Consumption (Memory)
Demonstrative Examples
<?xml version="1.0"?><!DOCTYPE MaliciousDTD [<!ENTITY ZERO "A"><!ENTITY ONE "&ZERO;&ZERO;"><!ENTITY TWO "&ONE;&ONE;">...<!ENTITY THIRTYTWO "&THIRTYONE;&THIRTYONE;">]><data>&THIRTYTWO;</data>Real-World CVE Examples
| CVE ID | Description |
|---|---|
| CVE-2009-1955 | XML bomb in web server module |
| CVE-2003-1564 | Parsing library allows XML bomb |
Related Weaknesses
Taxonomy Mappings
- PLOVER: — Data Amplification
- The CERT Oracle Secure Coding Standard for Java (2011): IDS04-J — Limit the size of files passed to ZipInputStream
Frequently Asked Questions
What is CWE-409?
CWE-409 (Improper Handling of Highly Compressed Data (Data Amplification)) is a software weakness identified by MITRE's Common Weakness Enumeration. It is classified as a Base-level weakness. The product does not handle or incorrectly handles a compressed input with a very high compression ratio that produces a large output.
How can CWE-409 be exploited?
Attackers can exploit CWE-409 (Improper Handling of Highly Compressed Data (Data Amplification)) to dos: amplification, dos: crash, exit, or restart, dos: resource consumption (cpu), dos: resource consumption (memory). This weakness is typically introduced during the Architecture and Design, Implementation phase of software development.
How do I prevent CWE-409?
Follow secure coding practices, conduct code reviews, and use automated security testing tools (SAST/DAST) to detect this weakness early in the development lifecycle.
What is the severity of CWE-409?
CWE-409 is classified as a Base-level weakness (Medium abstraction). It has been observed in 2 real-world CVEs.