Skip to content

Instantly share code, notes, and snippets.

@prinsharma1999
Last active October 9, 2024 08:39
Show Gist options
  • Save prinsharma1999/586156a8658cbcf75856ebf5887917d6 to your computer and use it in GitHub Desktop.
Save prinsharma1999/586156a8658cbcf75856ebf5887917d6 to your computer and use it in GitHub Desktop.
# # Description An XML External Entity attack is a type of attack against an application that parses XML input. This attack occurs when XML input containing a reference to an external entity is processed by a weakly configured XML parser. This attac

# WRITE-UPS

Injection Signatures, Malicious Inputs, XSS, HTTP Header Injection, XXE, RCE https://github.com/xsscx/Commodity-Injection-Signatures

XXE in uber.com https://httpsonly.blogspot.com.es/2017/01/0day-writeup-xxe-in-ubercom.html

Hunting in the Dark - Blind XXE https://blog.zsec.uk/blind-xxe-learning/amp/

Injection Signatures, Malicious Inputs, XSS, HTTP Header Injection, XXE, RCE https://github.com/xsscx/Commodity-Injection-Signatures

XXE from Script Kiddie to Jedi Master (Slides) https://www.slideshare.net/mobile/ssuserf09cba/xxe-how-to-become-a-jedi

XXE - Things Are Getting Out of Band https://blog.zsec.uk/out-of-band-xxe-2/

vulnerable_xxe A C# web handler that is vulnerable to XXE with PoC. This is to serve as an example of what vulnerable C# code looks like. https://github.com/brandonprry/vulnerable_xxe

Playing with Content-Type – XXE on JSON Endpoints https://blog.netspi.com/playing-content-type-xxe-json-endpoints/

XML External Entity Injection in Jive-n (CVE-2018-5758) https://rhinosecuritylabs.com/research/xml-external-entity-injection-xxe-cve-2018-5758/

XXE in Site Audit function exposing file and directory contents https://hackerone.com/reports/312543

CVE-2018-0878 | Windows Remote Assistance XXE vulnerability details released! https://krbtgt.pw/windows-remote-assistance-xxe-vulnerability/

A collection of scripts that run on my web server. Mainly for debugging SSRF, blind XSS, and XXE vulnerabilities. https://github.com/jobertabma/ground-control

Gaining Filesystem Access via Blind OOB XXE https://hawkinsecurity.com/2018/03/24/gaining-filesystem-access-via-blind-oob-xxe/

blind XXE in autodiscover parser https://hackerone.com/reports/315837

OWASP TOP 10: XXE https://blog.detectify.com/2018/04/17/owasp-top-10-xxe/

2018-07-23 | BEING A SECURITY EXPERT, LATEST SOCIAL ENGINEERING TRENDS, AND FISA DOCUMENTS RELEASED FOR FIRST TIME https://www.hackerone.com/zerodaily/2018-07-23

LFI and SSRF via XXE in emblem editor https://hackerone.com/reports/347139

SOAP- Based Unauthenticated Out-of-Band XML External Entity (OOB-XXE) in a Help Desk Software https://medium.com/@mrnikhilsri/soap-based-unauthenticated-out-of-band-xml-external-entity-oob-xxe-in-a-help-desk-software-c27a6abf182a

Understanding Xxe From Basic To Blind http://agrawalsmart7.com/2018/11/10/Understanding-XXE-from-Basic-to-Blind.html

OOB XXE in PrizmDoc (CVE-2018–15805) https://medium.com/@mrnikhilsri/oob-xxe-in-prizmdoc-cve-2018-15805-dfb1e474345c

An interesting XXE in SAP https://medium.com/@zain.sabahat/an-interesting-xxe-in-sap-8b35fec6ef33

XXE on ██████████ by bypassing WAF ████ https://hackerone.com/reports/433996

XSS to XXE in Prince v10 and below (CVE-2018-19858) https://www.corben.io/XSS-to-XXE-in-Prince/

2018-12-07 | HACKTIVITY HIGHLIGHTS, RED TEAMING MIND MAP, AND IN DEFENSE OF MIMIKATZ https://www.hackerone.com/zerodaily/2018-12-07

From blind XXE to root-level file read access https://www.honoki.net/2018/12/from-blind-xxe-to-root-level-file-read-access/

XXE Attacks— Part 1: XML Basics https://medium.com/@klose7/https-medium-com-klose7-xxe-attacks-part-1-xml-basics-6fa803da9f26

XXE on https://duckduckgo.com https://hackerone.com/reports/483774

XXE that can Bypass WAF Protection https://lab.wallarm.com/xxe-that-can-bypass-waf-protection-98f679452ce0

Bug Bytes #5 -Lazy Hackers, Stök’s blind XXE and Inception http://blog.intigriti.com/2019/02/12/bug-bytes-5-lazy-hackers-stoks-blind-xxe-and-inception/

XXE on pulse.mail.ru https://hackerone.com/reports/505947

Exploiting Apache Solr through OpenCMS https://www.shielder.it/blog/exploit-apache-solr-through-opencms/

XML external entity (XXE) injection https://portswigger.net/web-security/xxe

SSRF and XXE Vulnerabilities in PDFreactor https://securityboulevard.com/2019/05/ssrf-and-xxe-vulnerabilities-in-pdfreactor/

A Deep Dive into XXE Injection https://www.synack.com/blog/a-deep-dive-into-xxe-injection/

Bug Bytes #29 – Why do Penetration Testing Teams Hate You, SSL/TLS vulnerabilities & A Deep Dive into XXE Injection http://blog.intigriti.com/2019/07/30/bug-bytes-29-why-do-penetration-testing-team-hate-you-ssl-tls-vulnerabilities-a-deep-dive-into-xxe-injection/

Exfiltration through FTP using OOB XXE

Upload accepts .xlsx files --> Unzip sample .xlsx file -> add payload in workbook.xml/[Content_Types].xml after xml declaration --> DTD file send data via ftp://remote-ip/%data --> run ftp server using xxe-ftp-server.rb --> /etc/passwd

Via: https://twitter.com/_ayoubfathi_/status/1164536885244583941

Toolkit to detect and keep track on Blind XSS, XXE & SSRF https://github.com/SpiderMate/B-XSSRF

If you find powerful OXML XXE tool? it's "DOCEM" https://www.hahwul.com/2019/09/oxml-xxe-payload-inject-tool-docem.html

XXE at ecjobs.starbucks.com.cn/retail/hxpublic_v6/hxdynamicpage6.aspx https://hackerone.com/reports/500515

XML External Entity (XXE) Injection Payload List https://medium.com/@ismailtasdelen/xml-external-entity-xxe-injection-payload-list-937d33e5e116

SPILLING LOCAL FILES VIA XXE WHEN HTTP OOB FAILS https://www.noob.ninja/2019/12/spilling-local-files-via-xxe-when-http.html

Exploiting XML External Entity (XXE) Injections https://medium.com/@onehackman/exploiting-xml-external-entity-xxe-injections-b0e3eac388f9

Very cool XXE bug in a Web Service https://medium.com/@soyelmago/very-cool-xxe-bug-in-a-web-service-85bfaa5b035c

Blind XXE payload generator using postb.in https://github.com/discodamone/XXE-Generator

$5,005 worth vulnerability Duplicated, How I loose $5,005 in a day? Denial of Service - Billion LAUGH Attack (XXE) https://medium.com/@protector47/5-005-worth-vulnerability-duplicated-how-i-loose-5-005-in-a-day-831f5a064713

XXE-scape through the front door: circumventing the firewall with HTTP request smuggling https://honoki.net/2020/03/18/xxe-scape-through-the-front-door-circumventing-the-firewall-with-http-request-smuggling/

The road from sandboxed SSTI to SSRF and XXE

https://www.reddit.com/r/Slackers/comments/g6pt8t/the_road_from_sandboxed_ssti_to_ssrf_and_xxe/

h1{Error based XXE - bug bounty writeup}

https://f4d3.io/xxe_wild/

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment