handbook/tools/3.Web-Hacking/4.Injection/XXE/Commands/3.XXE-Blind.md
2024-08-31 01:07:22 +02:00

775 B

Blind XXE Vulnerabilities

This means that the application does not return the values of any defined external entities in its responses, and so direct retrieval of server-side files is not possible.

XInclude Attacks

  • Server steps

    • Application receives client-submitted data
    • Data is embedded on the server-side into an XML document
    • Document is then parsed
  • XInclude

    • Part of the XML specification that allows an XML document to be built from sub-documents
    • Need to reference the XInclude namespace and provide the path to the file that you wish to include
<foo 
xmlns:xi="http://www.w3.org/2001/XInclude">
<xi:include parse="text"
href="file:///etc/passwd"/></foo>

More info about XML Injection ---> [HERE](3 - XML)