webPromedium
XXE read
web-kids20
Task WEB_d241 from advanced category. The web application accepts XML data and parses it. The goal is to exploit an XXE (XML External Entity) vulnerability to read local files.
🔒
Permission denied (requires tier.pro)
Sign in to access full writeups
Sign in with GitHub to continue. No email required.
$sign in$ grep --similar
Similar writeups
- [web][Pro]XXE filter— web-kids20
- [web][Pro]Lab 140 — Pressboard — XXE via RSS Feed Import— hackadvisor
- [web][Pro]Zip slip— web-kids20
- [web][Pro]Lab 139 — HireFlow — XXE via XML Application Intake— hackadvisor
- [web][free]Jailbreak— hackthebox