“Beyond the Obvious: How a Dead-End XXE Led to a Critical SQLi Goldmine”
研究人员在尝试通过文件上传漏洞攻击目标时,发现服务器将上传内容误认为XML并返回错误信息。经过多次尝试和分析后,研究人员意识到需要构造有效的XML格式文件以绕过限制,并最终成功利用该漏洞。 2025-9-12 05:25:55 Author: infosecwriteups.com(查看原文) 阅读量:3 收藏

From a frustrating file upload to a database of a million records, the path to a critical bug is rarely a straight line.

Aman Sharma

We’ve all been there. You find an endpoint that makes your hacker senses tingle. A file upload form. Your mind races with possibilities — PHP shells, malicious PDFs, the works. You fire up Burp Suite, eager to claim your bounty, only to hit a wall. The error messages are clear: it’s not a file upload. It’s something else entirely.

FREE LINK

Press enter or click to view image in full size

This is the story of one such target. It’s a masterclass in persistence, adaptability, and why you should never, ever delete a tab in Burp.

The First Look: A Promising Door That Slammed Shut

My journey started like many others: with subdomain enumeration. Amass, Subfinder, the usual tools. One subdomain stood out: invoices.corp-target.com. It hosted a single, sleek HTML form for uploading files. Jackpot, right?

I started with the classic tests. Uploading a shell.php. The server responded, not with a generic error, but with a verbose one: "Error: File processed as XML. Root element is missing."


文章来源: https://infosecwriteups.com/beyond-the-obvious-how-a-dead-end-xxe-led-to-a-critical-sqli-goldmine-d368f5ddaadc?source=rss----7b722bfd1b8d---4
如有侵权请联系:admin#unsafe.sh