A5:2021 | Security Misconfiguration (7) | Cycubix Docs
Last updated
Last updated
In modern REST frameworks, the server might be able to accepts data formats that you as a developer did not think about. So this might result in JSON endpoints being vulnerable to XXE attacks.
Again same exercise but try to perform the same XML injection as we did in first assignment.
Hints: Take a look at the content type. Does the endpoint only accept json messages?.
Like in the previous exercise, we can use our Development Tools, Burp or Zap.
When you insert a comment see what is the answer.
Let's change the content type from JSON to XXE.
With Burp or ZAP
Open the browser and turn the interceptor on Navigate into http://localhost:8080/WebGoat and the corresponding lesson.
Submit a comment and intercept the request with the corresponding tool (ZAP or Burp).
Send the request to the Repeater (Burp) or Request Editor (ZAP).
Change the request accordingly:
Edit header: from Content-Type: application/json to Content-Type: application/xml.
Edit {"text":"your comment} to
<?xml version="1.0"?><!DOCTYPE comment [<!ENTITY xxe SYSTEM "file:///">]><comment><text>&xxe;</text></comment>
With Development Tools
Open the Development Tools in the browser, and go to the Network tab.
On WebGoat, post a comment.
Find the request related to posting the comment. It will typically have a POST method.
Change the body and header with:
Edit the body with:
Edit the header