[PentesterLab Exercise] Outbound XML Entity Exploitation

Introduction

This course details the exploitation of a XML entity bug in the Play framework. This issue can be used to retrieve arbitrary files and list the content of arbitrary directories.
The interresting thing about this bug is that it’s completely transparent and can stay (and stayed) unnoticed for a long time. To find this bug in a black-box test, you need to know what you are looking for. If you want to go ahead without following the course, you can find the advisory here.

Read More: Link

Author: WhiteHat News Admin

Share This Post On