XXE injection
Theory
Practice
Identify an XXE injection vulnerability
POST /action HTTP/1.1
Host: some.website
[...]
Connection: close
<?xml version="1.0"?>
<searchForm>
<from>TESTINPUT</from>
</searchForm>Retrieve content of local files
Conduct an SSRF attack
Blind XXE
Blind XXE via error messages

Blind XXE by repurposing a local DTD

Resources
Last updated
Was this helpful?