目录
Learn:http://www.w3school.com.cn/xml/xml_intro.asp
Simple note:
XML
A simple example of XML:
1 |
<?xml version="1.0" encoding="ISO-8859-1 ?> |
In XML, there are five predefined entity reference(实体引用):
1 |
<< |
A example of load an XML document to XML parser(解释器) :
1 |
|
DTD
A example about DTD in XML:
1 |
<?xml version="1.0" encoding="ISO-8859-1 ?> |
External document declaration:
<!DOCTYPE skate SYSTEM "file_path">
PCDATA means parsed character data. The tags in the text will be handled as a flag and the entity will be expand.
CDATA means character data and it will not be expand.
In DTD , declare an element and a attribute.:
1 |
<!ELEMENT Element_name category> |
DTD - Entity(实体):
A entity declare:
Internal entity:
1 |
|
External entity:
1 |
DTD: |
Parameter entity:
1 |
<!ENTITY %entity_name "value"> |
Try
This is a internal entity:
1 |
|
I don’t know why that I can’t build a xml within external entity successfully. So I wanan put it away in this time.
DIG
When there is a post , it made up by xml. And the parameter can be control. Mybe there hava a XXE vluntery.
We can use some simple xml to test it.
1 |
|
If it return “Testing”. We can use another to get more information.
Normal XXE
1 |
|
Parameter entity:
1 |
|
If the website return nothing , There is another mean to deal with this problem.
Use external entity:
XML:
1 |
|
DTD:
1 |
<!ENTITY foo SYSTEM "file:///etc/passwd"> |
Blind XXE with ceye.io:
1 |
|
We can create a dtd to get echo result(回显结果).
XML:
1 |
|
DTD:
1 |
<?xml version="1.0" encoding="UTF-8"?> |
If the XEE is exist, ceye will get a GET request.
Of course there are many means to get important and private information. But due to my ability, I wanna put it down to learn more important things.
XML in PHP:
1 |
|
Reference
- hu3sky’blog(There is a poc about how to probe intranet)
- 使用本地DTD文件来利用XXE漏洞实现任意结果输出
- 浅谈XXE攻击
- XXE漏洞攻防
- 中国电信某省系统Blink XXE
- 搜狐焦点主站Blind XXE利用Cloudeye神器测试
- 利用网易一处XXE盲注演示如何通过cloudeye配合实现文件内容读取
- 汉启科技智能邮件系统一个XXE文件读取引发的血案
- Xfire文件读取漏洞(…Service?wsdl)
- XXE & SQL 方维O2O商业系统SQL注入漏洞+XXE实体注入
- 用友人力资源管理软件全版本XXE漏洞 (XXE FUZZ)
- [From blind XXE to root-level file read access]https://www.honoki.net/2018/12/from-blind-xxe-to-root-level-file-read-access/
- By:threezh1.com
- 左青龙
- 微信扫一扫
-
- 右白虎
- 微信扫一扫
-
评论