“Beyond the Obvious: How a Dead-End XXE Led to a Critical SQLi Goldmine”
测试文件上传功能时发现服务器将文件误认为XML或JSON格式并返回详细错误信息最终通过分析错误提示找到漏洞所在展示了耐心和细致分析的重要性。 2025-9-12 05:25:55 Author: infosecwriteups.com(查看原文) 阅读量:3 收藏

From a frustrating file upload to a database of a million records, the path to a critical bug is rarely a straight line.

Aman Sharma

We’ve all been there. You find an endpoint that makes your hacker senses tingle. A file upload form. Your mind races with possibilities — PHP shells, malicious PDFs, the works. You fire up Burp Suite, eager to claim your bounty, only to hit a wall. The error messages are clear: it’s not a file upload. It’s something else entirely.

FREE LINK

Press enter or click to view image in full size

This is the story of one such target. It’s a masterclass in persistence, adaptability, and why you should never, ever delete a tab in Burp.

The First Look: A Promising Door That Slammed Shut

My journey started like many others: with subdomain enumeration. Amass, Subfinder, the usual tools. One subdomain stood out: invoices.corp-target.com. It hosted a single, sleek HTML form for uploading files. Jackpot, right?

I started with the classic tests. Uploading a shell.php. The server responded, not with a generic error, but with a verbose one: "Error: File processed as XML. Root element is missing."


文章来源: https://infosecwriteups.com/beyond-the-obvious-how-a-dead-end-xxe-led-to-a-critical-sqli-goldmine-d368f5ddaadc?source=rss----7b722bfd1b8d--bug_bounty
如有侵权请联系:admin#unsafe.sh