WordPress and Drupal are affected by a DoS (denial of service) vulnerability on the PHP XML parser used by their XMLRPC implementations. The issue lies in the XML entity expansion parser that can cause CPU and memory exhaustion and the site's database to reach the maximum number of open connections. The vulnerability is named XML quadratic blowup attack and was reported by Nir Goldshlager.
"An XML quadratic blowup attack is similar to a Billion Laughs attack. Essentially, it exploits the use of entity expansion. Instead of deferring to the use of nested entities, it replicates one large entity using a couple thousand characters repeatedly. A medium-sized XML document of approximately two hundred kilobytes may require anywhere within the range of one hundred MB to several GB of memory. When the attack is combined with a particular level of nested expansion, an attacker is then able to achieve a higher ratio of success."
- Update WordPress/Drupal to the latest version or restrict access to the xmlrpc file.
- Apache Struts 2 ClassLoader manipulation and denial of service (S2-020)
- WordPress 2.0.1 Denial of Service Vulnerability (0.6.2 - 2.0.1 )
- WordPress Plugin Cimy User Extra Fields Denial of Service (2.6.3)
- WordPress 3.7.x Denial of Service Vulnerability (3.7 - 3.7.25)
- PHP HTTP POST incorrect MIME header parsing vulnerability