OPSWAT Expands Vietnam Presence, Opens First Critical Infrastructure Protection Lab in Asia. Read More

Metadefender Now Supports Data Sanitization for XML Documents

Infected XML Document

The flexibility of XML has resulted in its widespread usage, including within Microsoft Office documents and SOAP messages. However, XML documents have many security vulnerabilities that can be targeted for different types of attacks, such as file retrieval, server side request forgery, port scanning, or brute force attacks.

OPSWAT MetaDefender data sanitization (CDR) now supports XML document sanitization to address many of these potential threats. Here is a list of threats addressed by our data sanitization technology:

  • XML injection
  • XSS/CDATA Injection
  • Oversized payloads or XML bombs
  • Recursive payloads
  • VB macro
  • JavaScript

This covers a large percentage of XML threats. However, in the future we plan to expand coverage to include protection for the following threats as well:

  • XPath injection
  • External Entity Reference Attack
  • Unused namespace exploitation
  • Homograph Attack
  • Bidirectional Text Spoofing

A beta version of data sanitization for XML documents is available with the latest MetaDefender Core release. If you have any feedback or questions about this new functionality, please contact us and let us know.

For more information, please contact one of our cybersecurity experts.

Sign up for Blog updates!
Get information and insight from the leader in advanced threat prevention.