Abusing XSLT for Practical Attacks

Black Hat USA 2015

Presented by: Fernando Arnaboldi
Date: Thursday August 06, 2015
Time: 15:50 - 16:40
Location: Lagoon K

Over the years, XML has been a rich target for attackers due to flaws in its design as well as implementations. It is a tempting target because it is used by other programming languages to interconnect applications and is supported by web browsers. In this talk, I will demonstrate how to use XSLT to produce documents that are vulnerable to new exploits.

XSLT can be leveraged to affect the integrity of arithmetic operations, lead to code logic failure, or cause random values to use the same initialization vector. Error disclosure has always provided valuable information, but thanks to XSLT, it is possible to partially read system files that could disclose service or system's passwords. Finally, XSLT can be used to compromise end-user confidentiality by abusing the same-origin policy concept present in web browsers.This presentation includes proof-of-concept attacks demonstrating XSLTs potential to affect production systems, along with recommendations for safe development.

Fernando Arnaboldi

Fernando Arnaboldi is a senior security researcher and consultant at IOActive, Inc. He has over 10 years of experience in the security research space (Deloitte, Core Security Technologies, and IOActive) and he holds a Bachelor's degree in Computer Science.


KhanFu - Mobile schedules for INFOSEC conferences.
Mobile interface | Alternate Formats