XML External Entities Injection (XXE)
Blind XXE
Example exploit.dtd:
Corresponding POST request payload:
Where exploit.dtd is a file that is hosted on my computer, on IP address 192.168.6.1.
The reason I’m hosting the file is because parameter entity references aren’t allowed in the payload.
PHP doesn’t allow newlines in an URL, which is why I had to use the php:// to base64 encode the payload.
Last updated