Will Vandevanter - @_will_is_
Agenda (30 minutes):
Slides, References, and Code:
oxmlxxe.github.io
XXE in docx
XXE in PDF
Google Research - "Lens Blur in the new Google Camera App" (04/16/14)
XXE in JPG
< !DOCTYPE root [
< !ENTITY post "MYSTRING">
]>
/word/document.xml
/ppt/presentation.xml
/xl/workbook.xml
XSS Testing
< !ENTITY post "<script>alert(1)...
< !ENTITY post "< ![CDATA[<script>alert(1)...
LFI
Relationship Id="rId1" Type="...relationships/officeDocument" Target="/word/document.xml"
hlinkHover
XSLTransform
Embedded "Documents"
SSRF
Classic (X)XE
Canary Testing DTD and XE
XSS XE testing (CDATA/plain/attr)
XE LFI
Embedded (X)XE attacks
SSRF (X)XE
(DEFENSE) The libraries that parse XML on one part of the site (e.g. API) may not be the same ones that parse uploaded files; verify! Check configurations.
(DEFENSE) Patches exist, many are recent
(OFFENSE) Lots of surface area for exploitation
(OFFENSE) Untouched research targets
Thanks!
http://oxmlxxe.github.io