Web services are essential for online interactions, supporting critical tasks like banking and shopping, but their importance also makes them prime targets for attacks. Attackers try to manipulate data injecting malicious code, potentially compromising systems. Current approaches to preventing such attacks use techniques like attack grammars, symbolic execution, or machine learning to detect vulnerabilities or manually embed malicious payloads, that can miss parts of the service under test. In this paper, we propose XAVIER, a framework for detecting XML injection vulnerabilities. By leveraging the WSDL speci cation of a web service, XAVIER crafts XML messages that re ect the service’s functionality, enabling the examination of web services for XMLi vulnerabilities. Results show that XAVIER performs equally, or better than the state-of-the-art tool, SOAPUI PRO. Compared to the latter, XAVIERisopensourceandextensible,providingaplatformforfuture research in the eld.
History
Primary Research Area
Threat Detection and Defenses
Name of Conference
International Symposium on Software Testing and Analysis (ISSTA)
CISPA Affiliation
Yes
Page Range
46-50
Publisher
Association for Computing Machinery (ACM)
Open Access Type
Not Open Access
BibTeX
@conference{Kalbitzer:Amaya:Zeller:2025,
title = "XAVIER: Grammar-Based Testing for XML Injection Attacks",
author = "Kalbitzer, Paul" AND "Amaya, Jose Antonio Zamudio" AND "Zeller, Andreas",
year = 2025,
month = 6,
pages = "46--50",
publisher = "Association for Computing Machinery (ACM)",
doi = "10.1145/3713081.3731736"
}