
This lesson requires Loopus Pro access. Upgrade to unlock all courses, labs, and challenges.
XML External Entity (XXE) injection exploits XML parsers that process external entity references. This vulnerability can lead to file disclosure, SSRF, denial of service, and in some cases remote code execution.
XML allows defining entities which are essentially variables that get expanded during parsing. External entities reference content from URLs or files using SYSTEM keyword.
When output is not displayed, use out-of-band techniques. Reference an external DTD hosted on attacker server that defines entities exfiltrating data via HTTP or DNS requests.
Look for XML processing in API endpoints accepting XML, file upload features (DOCX, XLSX, SVG), SAML authentication, RSS/Atom feed processors, and SOAP web services.
Secure XML parsing requires disabling external entities in XML parsers, using JSON instead of XML when possible, validating and sanitizing XML input, and updating XML libraries regularly.
What vulnerability abuses XML parsers?
What XML element declares external entities?
What type of entity retrieves data out of band?
What keyword defines an external entity source?
Found the flag? Submit it below to complete this lesson.
Format: LOOPUS{...}