webProeasy
Lab 24 — SheetMetric — XXE via Malicious Excel Upload
hackadvisor
Task: SheetMetric business analytics platform with .xlsx file upload processed server-side by Java XML parser with external entity resolution enabled. Solution: XXE injection via crafted XLSX file with malicious DOCTYPE in xl/sharedStrings.xml to read /root/flag.txt through file:// protocol entity.
$ ls tags/ techniques/
xxe_file_readexternal_entity_injectionxlsx_xxemalicious_excel_uploadshared_strings_injection
🔒
Permission denied (requires tier.pro)
Sign in to access full writeups
Sign in with GitHub to continue. No email required.
$sign in$ grep --similar
Similar writeups
- [web][Pro]MetricFlow — DOM XSS via Prototype Pollution Gadget— hackadvisor
- [web][Pro]Lab 38 — PipelineForge — XXE in XML Pipeline Import— hackadvisor
- [web][Pro]MetricForge— hackadvisor
- [web][Pro]Lab 139 — HireFlow — XXE via XML Application Intake— hackadvisor
- [web][free]open-insight— umdctf