Module Name: Xpath Injection Brute Forcer
Module path: exploitation/injection/xpath_bruter


BASE_URL:
BASIC_PASS:
BASIC_USER:
COOKIE:
PARAMETERS:
POST:
STRING:


Name: Xpath Injection Brute Forcer
Path: modules/exploitation/injection/xpath_bruter.py
Author: Tim Tomes (@LaNMaSteR53)

Description:
Exploits XPath injection flaws to enumerate the contents of serverside XML documents.

Options:
Name Current Value Required Description
BASE_URL yes the target resource url excluding any parameters
BASIC_PASS no password for basic authentication
BASIC_USER no username for basic authentication
COOKIE no cookie string containing authenticated session data
PARAMETERS yes query parameters with '<inject>' signifying the injection
POST False yes set the request method to post. parameters should still be submitted in the url option
STRING yes unique string found when the injection results in 'True'