Exploiting XXE to perform SSRF attacks
PreviousExploiting XXE using external entities to retrieve filesNextBlind XXE with out-of-band interaction
Last updated
Was this helpful?
Last updated
Was this helpful?
the lab has a "check stock" feature that parses XML input and returns unexpected values
send to repeater
so it reveals the directory latest -> let's now make request to http://169.254.169.254/latest
and it keeps revealing directories so each time a directory revealed make an http request to it using xxe vulnerability until you find the last diretory where the API KEY exist
doing this we will find that the api key exist on http://169.254.169.254/latest/meta-data/iam/security-credentials/admin/
hope you found this walkthrough easy to understand and follow
Greeting From Sayonara