Skip to main contentSkip to main content
Room Banner
Back to all walkthroughs
Room Icon

XXE Injection

Premium room

Exploiting XML External Entities.

medium

60 min

12,353

User profile photo.
User profile photo.

To access material, start machines and answer questions login.

Introduction

( External Entity) injection is a type of security flaw that exploits vulnerabilities in an application's input. It occurs when an application accepts input that includes external entity references within the itself. Attackers can leverage this vulnerability to disclose local files, make server-side requests, or execute remote code.

Given the widespread use of in web applications, particularly in web services and -based APIs, the severity of these vulnerabilities cannot be underestimated.

Objectives

  1. Recognize the fundamental concepts and dangers associated with injection.
  2. Identify vulnerable processing configurations and practices.
  3. Develop techniques for detecting, exploiting, and mitigating vulnerabilities in applications.

Prerequisites

  1. Knowledge of how documents are structured, including tags, attributes, and entity references.
  2. Familiarity with how web applications process input and manage data.
  3. Basic knowledge of or .
Answer the questions below
Deploy the target VM attached to this task by pressing the green Start Machine button. After obtaining the machine's generated IP address, you can either use the AttackBox or your own VM connected to TryHackMe's VPN.

After 3 minutes, visit http://MACHINE_IP to access the machine.

Ready to learn Cyber Security?

The XXE Injection room is only available for premium users. Signup now to access more than 500 free rooms and learn cyber security through a fun, interactive learning environment.

Already have an account? Log in

We use cookies to ensure you get the best user experience. For more information see our cookie policy.