mirror of
https://github.com/swisskyrepo/PayloadsAllTheThings.git
synced 2025-12-12 15:49:38 -08:00
CSP updates + Indirect Prompt Injection
This commit is contained in:
3
XSLT Injection/Files/system-properties.xml
Normal file
3
XSLT Injection/Files/system-properties.xml
Normal file
@@ -0,0 +1,3 @@
|
||||
<?xml version="1.0" encoding="UTF-8"?>
|
||||
<?xml-stylesheet href="system-properties.xsl" type="text/xsl"?>
|
||||
<root/>
|
||||
10
XSLT Injection/Files/system-properties.xsl
Normal file
10
XSLT Injection/Files/system-properties.xsl
Normal file
@@ -0,0 +1,10 @@
|
||||
<?xml version="1.0" encoding="UTF-8"?>
|
||||
<xsl:stylesheet version="1.0" xmlns:xsl="http://www.w3.org/1999/XSL/Transform">
|
||||
<xsl:template match="/">
|
||||
<p>
|
||||
Version: <xsl:value-of select="system-property('xsl:version')" /> <br />
|
||||
Vendor: <xsl:value-of select="system-property('xsl:vendor')" /> <br />
|
||||
Vendor URL: <xsl:value-of select="system-property('xsl:vendor-url')" />
|
||||
</p>
|
||||
</xsl:template>
|
||||
</xsl:stylesheet>
|
||||
@@ -222,6 +222,7 @@ Execute a remote php file using `file_put_contents`
|
||||
|
||||
## References
|
||||
|
||||
* [From XSLT code execution to Meterpreter shells - 02 July 2012 - @agarri](https://www.agarri.fr/blog/archives/2012/07/02/from_xslt_code_execution_to_meterpreter_shells/index.html)
|
||||
* [From XSLT code execution to Meterpreter shells - @agarri - 02 July 2012](https://www.agarri.fr/blog/archives/2012/07/02/from_xslt_code_execution_to_meterpreter_shells/index.html)
|
||||
* [XSLT Injection - Fortify](https://vulncat.fortify.com/en/detail?id=desc.dataflow.java.xslt_injection)
|
||||
* [XSLT Injection Basics - Saxon](https://blog.hunniccyber.com/ektron-cms-remote-code-execution-xslt-transform-injection-java/)
|
||||
* [Getting XXE in Web Browsers using ChatGPT - Igor Sak-Sakovskiy - May 22, 2024](https://swarm.ptsecurity.com/xxe-chrome-safari-chatgpt/)
|
||||
Reference in New Issue
Block a user