Skip to content

ex-cal1bur/XSLT-Injection_reverse-shell

Folders and files

NameName
Last commit message
Last commit date

Latest commit

ย 

History

5 Commits
ย 
ย 
ย 
ย 
ย 
ย 

Repository files navigation

XSLT Injection - Technical Analysis

๐Ÿ” What is XSLT Injection?

XSLT (Extensible Stylesheet Language Transformations) is a language for transforming XML documents. XSLT injection occurs when an application allows an attacker to control or modify XSLT stylesheets that are executed on the server.

โšก Exploitation Mechanism

Main Vector: exsl:document

The specific vulnerability exploited by this project is the abuse of the EXSLT exsl:document extension, which allows files to be written during the XSLT transformation process.

Attack Flow

  1. Injection: Malicious XSLT is provided to a vulnerable processor
  2. File Write: exsl:document writes arbitrary files to the system
  3. Execution: The written files can be executable scripts
  4. Access: A reverse shell connection is established

๐Ÿ› ๏ธ Necessary Conditions

For this attack to work, the environment must have:

  • XSLT processor with support for EXSLT extensions
  • Write permissions in the file system
  • Ability to execute the created files
  • No validation of XSLT inputs

๐ŸŽฏ Potential Impact

  • Remote command execution (RCE)
  • Reverse shell on the server
  • Arbitrary writing of files
  • Complete compromise of the system

Project for educational purposes in controlled environments

About

Demonstration of advanced exploitation using XSLT injection to achieve a reverse shell.

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published

Languages