Page 141 - Hands-On Bug Hunting for Penetration Testers
P. 141

Detecting XML External Entities                                             Chapter 7

            Instructions to reproduce

            Our instructions to reproduce are to navigate to the form and use a proxy tool (in our case,
            Burp Proxy) to replace the form data with our payload.


            Attack scenario

            We've already seen how an entity expansion pointing to  EFW SBOEPN can cause a server
            to crash. Using an XXE attack, we can also disclose the contents of sensitive server files like
             FUD QBTTXPSE and, in some cases, perform RCE.


            Final report

            Let's use this information to format our submission:

                $"5&(03:  99& BUUBDL
                5*.&                           65$

                63-  IUUQ

                1":-0"%
                  YNM WFSTJPO       FODPEJOH  65'
                  %0$5:1& SFQMBDF <  &/5*5: FYBNQMF  4VDDFTT   >
                 SPPU  OBNF &EXBSE
                )BXLT  OBNF  UFM             UFM  FNBJM  FYBNQMF   FNBJM  QBTTXPSE SPHVFNPP
                O  QBTTXPSE   SPPU

                .&5)0%0-0(:  5IF WVMOFSBCJMJUZ XBT EJTDPWFSFE CZ NBOVBMMZ JOUFSDFQUJOH BOE
                FEJUJOH UIF DSFBUF BDDPVOU GPSN UP JODMVEF UIF BCPWF FOUJUZ SFQMBDFNFOU
                DIBOHFT

                */4536$5*0/4 50 3&130%6$&

                   /BWJHBUF UP UIF DSFBUF BDDPVOU GPSN BU IUUQ
                   &OUFS EVNNZ WBMVFT JOUP UIF GPSN BOE TVCNJU JU

                   *OUFSDFQU UIF HFOFSBUFE )551 1045 SFRVFTU VTJOH B UPPM MJLF #VSQ 1SPYZ
                &EJU UIF 9.- EBUB UP JODMVEF UIF QBZMPBE BCPWF

                   'PSXBSE UIF 1045 SFRVFTU PO UP UIF TFSWFS

                "55"$, 4$&/"3*0

                                                    [ 126 ]
   136   137   138   139   140   141   142   143   144   145   146