XSLT Injection

Processing an unvalidated XSL stylesheet can allow an attacker to change the structure and contents of the resultant XML, include arbitrary files from the file system, or execute arbitrary code

Summary

  • Tools

  • Exploit

    • Determine the vendor and version

    • External Entity

    • Read files and SSRF using document

    • Remote Code Execution with Embedded Script Blocks

    • Remote Code Execution with PHP wrapper

    • Remote Code Execution with Java

    • Remote Code Execution with Native .NET

  • References

Tools

Exploit

Determine the vendor and version

External Entity

Read files and SSRF using document

Remote Code Execution with Embedded Script Blocks

Remote Code Execution with PHP wrapper

Execute the function readfile.

Execute the function scandir.

Execute a remote php file using assert

Execute a PHP meterpreter using PHP wrapper.

Remote Code Execution with Java

Remote Code Execution with Native .NET

References

Last updated