Lab: Exploiting XXE to perform SSRF attacks
Lab Scenario: Our mission is to exploit XXE through a web application's "Check stock" feature, ultimately performing SSRF attacks to access sensitive information from a metadata endpoint. By intercepting and manipulating a POST request, we intend to use XXE to trigger requests to a metadata endpoint and retrieve sensitive data. Let's proceed with the solution:
Intercepting the POST Request:
Visit a product page and click "Check stock."
Intercept the resulting POST request using Burp Suite.
Inserting External Entity Definition:
Insert the following external entity definition between the XML declaration and the
stockCheck
element:<!DOCTYPE test [ <!ENTITY xxe SYSTEM "http://169.254.169.254/latest/meta-data/iam/security-credentials/admin"> ]>
Replacing the productId with External Entity Reference:
Replace the
productId
number with a reference to the external entity:&xxe;
.The response should contain "Invalid product ID:" followed by the response from the metadata endpoint, initially a folder name.
Iterative Exploration of the Metadata API:
Iteratively update the URL in the Document Type Definition (DTD) to explore the API until reaching
/latest/meta-data/iam/security-credentials/admin
.This should return JSON containing the
SecretAccessKey
.
Confirming the Exploitation:
- Use the information obtained from the metadata endpoint to confirm the successful exploitation of SSRF through XXE.
Submitting the Solution:
- Use the appropriate method provided by the lab to submit the solution, confirming the successful retrieval of sensitive information.
Conclusion: This lab exercise provides practical insights into exploiting XXE vulnerabilities to perform SSRF attacks. By following this step-by-step guide, users can deepen their understanding of the relationship between XXE and SSRF, emphasizing the importance of securing against such vulnerabilities. Stay informed, keep learning, and continue exploring the dynamic field of cybersecurity to contribute to a more secure online environment.
Reference:
https://portswigger.net/web-security/xxe
https://portswigger.net/web-security/xxe/lab-exploiting-xxe-to-perform-ssrf
Subscribe to my newsletter
Read articles from Joel O. directly inside your inbox. Subscribe to the newsletter, and don't miss out.
Written by
Joel O.
Joel O.
A passionate cybersecurity enthusiast and cloud aficionado. I am on a mission to unravel the complexities of the ever-evolving cyber landscape and guide you through the vast expanse of cloud technology. As a cybersecurity professional, I bring a wealth of experience in securing digital ecosystems and defending against cyber threats. My journey in the cloud realm has been both thrilling and enlightening, and I am here to share my insights, discoveries, and practical tips with you. In these virtual pages, expect a fusion of in-depth cybersecurity analyses and explorations into the limitless possibilities of cloud computing and cybersecurity. Whether you're a seasoned cybersecurity professional, a cloud enthusiast, or someone just stepping into the digital frontier, there's something here for you.