Skip to content

Collection of XML payloads, along with a Python script for testing and exploiting XML-related security weaknesses.

Notifications You must be signed in to change notification settings

Cyber-Underground/XMLSploit

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

16 Commits
 
 
 
 
 
 
 
 

Repository files navigation

XMLSploit

XMLSploit is a powerful tool designed to aid in the exploration and analysis of XML vulnerabilities. This repository contains a collection of XML payloads, along with a Python script for testing and exploiting XML-related security weaknesses.

Features

  • Send XML Payload to Target URL:

    • Users can send XML payloads to target URLs.
    • The tool allows users to select from a variety of XML payloads.
  • Scan Website for XML Files and Vulnerabilities:

    • XMLSploit can scan websites for XML files in basic or advanced modes.
    • In advanced mode, the tool performs the following checks:
      • Fuzzing URLs to discover XML files.
      • Detection of common XML files like sitemaps and feeds.
      • Analysis of robots.txt to identify XML file exclusions.
      • Vulnerability checks:
        • XPath Injection detection.
        • XML Signature Spoofing detection.
        • XML Bomb (Billion Laughs) detection.
        • XML External Entity (XXE) Over HTTP detection.
        • Schema Poisoning vulnerability detection.
        • XPath Expression Injection detection.
        • Detection of potential SQL queries, code injections, command injections, and shell commands in XML content.
        • Identification of XML entities and potential XML bomb attacks.
    • Extraction of sensitive information:
      • Detection of database connection strings, API keys, encryption keys, and more.
  • Comprehensive XML Payloads: Explore a wide range of XML vulnerabilities with meticulously crafted payloads, covering the following exploit scenarios:

    • Exfiltration Fork Bomb
    • Simple XML Entity
    • Parameter Entity Expanding to External Entity
    • External Entity Inclusion
    • XXE: Entity
    • XXE: File Disclosure
    • XXE: Denial-of-Service
    • XXE: Local File Inclusion
    • XXE: Blind Local File Inclusion
    • XXE: Access Control Bypass (Loading Restricted Resources - PHP example)
    • XXE: SSRF (Server Side Request Forgery) Example
    • XXE: Remote Attack (Through External XML Inclusion) Example
    • XXE: UTF-7 Example
    • XXE: Base64 Encoded
    • XXE: XXE inside SOAP
    • XXE: XXE inside SVG

Usage

  1. Clone the Repository:

    git clone https://github.com/Cyber-Underground/XMLSploit/
  2. Install Dependencies:

    pip install -r requirements.txt
  3. Run the Script:

    python xmlsploit.py
  4. Follow the On-Screen Instructions:

    • Choose an option to send XML payloads to a target URL or scan a website for XML files.
    • Select a payload from the provided list.
    • Enter the target URL or website URL as prompted.
    • Customize the number of threads for concurrent execution if desired.

Contributions

Contributions to XMLSploit are welcome! If you have ideas for new payloads, feature enhancements, or bug fixes, feel free to open an issue or submit a pull request.

About

Collection of XML payloads, along with a Python script for testing and exploiting XML-related security weaknesses.

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published

Languages