# File Bomb Validation Analyzer PRO
|Category||Severity||Time To Fix|
|🛡️ Security||Minor||5 minutes|
This analyzer scans your application code to detect any input validations that allow for XML or ZIP files.
XML files expose a wide variety of attacks including the following:
- XML eXternal Entity injection (XXE) attacks (opens new window), which are now part of OWASP top 10.
- Malformed XML document vulnerabilities.
- Invalid XML document vulnerabilities.
- Billion laughs DOS attack (opens new window)
ZIP files may expose your application to a zip bomb attack. A zip bomb is an archive file that contains a large volume of data. It’s intended to cause a denial of service (DOS) by exhausting the disk space or memory of the target system that tries to extract the archive. A 1 MB zip bomb can decompress to 1 GB.
It is not possible for the analyzer to understand if your application is secure from XML vulnerabilities or zip bomb vulnerabilities, due to the wide variety of XML parsing and zip decompression libraries out there. So, if you allow a
xml mime type in your request validation, this analyzer simply flags that as a potential vulnerability and results in a failure.
The severity of this analyzer is marked as minor because it is not possible to completely determine if your application is vulnerable. However, do not take this lightly as XML and zip bomb attacks can cripple applications.
# How To Fix
If you can avoid XML or ZIP files in your application, it would be the easiest way to secure your application.
If that is not an option, avoid decompressing the ZIP files you accept from users. As for XML files, there is a wide variety of security checks you would need to implement. You may refer the OWASP XML security cheatsheet in the references below.