This project is archived. If someone has a working and maintained fork please let me know and I will point people there. Thank you to all of you. This was a fun project and a technique that yieled (and still yields) interesting research.
This tool is meant to help test XXE vulnerabilities in OXML document file formats. Currently supported:
- DOCX/XLSX/PPTX
- ODT/ODG/ODP/ODS
- SVG
- XML
- PDF (experimental)
- JPG (experimental)
- GIF (experimental)
BH USA 2015 Presentation: Exploiting XXE in File Upload Functionality (Slides) (Recorded Webcast)
Blog Posts on the topic:
OXML_XXE was re-written in Ruby using Sinatra, Bootstrap, and Haml. Installation should be easy with Docker:
- Run
docker-compose up
- Browse to http://localhost:4567/ to get started.
1. Build a File
Build mode adds a DOCTYPE
and inserts the XML Entity into the file of the users choice.
2. String Replace in File
String replacement mode goes through and looks for the symbol §
in the document. The XML Entity ("&xxe;") replaces any instances of this symbol. Note, you can open the document in and insert §
anywhere to have it replaced. The common use case would be a web application which reads in a xlsx
and then prints the results to the screen. Exploiting the XXE it would be possible to have the contents printed to the screen.