XXE Injection
XML External Entities disclose or retrieve arbitrary files from the target server's local system by modifying the submitted XML document. This can usually be the first step to gaining Remote Code Execution (RCE).
We can find a typical example of this vulnerability as follows:
A site accepts XML input and parses it without properly securing or validating it
Request format
We can send an XML petition to request a system file using the Entity parameter
XEE payload
With this, the contents of the requested file would be exposed
Example response
It also can be done against Windows hosts
XEE windows
Last updated
Was this helpful?