<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>XXE on RORO's blog</title><link>https://blog.rodolpheg.xyz/tags/xxe/</link><description>Recent content in XXE on RORO's blog</description><generator>Hugo</generator><language>fr-fr</language><managingEditor>contact@rodolpheg.xyz (0xRo)</managingEditor><webMaster>contact@rodolpheg.xyz (0xRo)</webMaster><lastBuildDate>Sat, 07 Feb 2026 00:00:00 +0000</lastBuildDate><atom:link href="https://blog.rodolpheg.xyz/tags/xxe/index.xml" rel="self" type="application/rss+xml"/><item><title>Enketo 6.2.1 - Auth-Bypass, SSRF, and XXE Browser Abuse to File Read</title><link>https://blog.rodolpheg.xyz/posts/enketo-auth-bypass-ssrf-xxe-and-file-read/</link><pubDate>Sat, 07 Feb 2026 00:00:00 +0000</pubDate><author>contact@rodolpheg.xyz (0xRo)</author><guid>https://blog.rodolpheg.xyz/posts/enketo-auth-bypass-ssrf-xxe-and-file-read/</guid><description>&lt;h2 id="introduction">Introduction&lt;/h2>
&lt;p>Original post: &lt;a href="https://offenskill.com/blog/enketo-arbitrary-file-read/">OffenSkill - Enketo 6.2.1 - Auth-Bypass, SSRF, and XXE Browser Abuse to File Read&lt;/a>&lt;/p>
&lt;p>This &lt;a href="https://offenskill.com/training">training&lt;/a> session was focused on white-box code review, application, and system runtime introspection.&lt;br>
We wanted to work on a JavaScript backend framework and &lt;a href="https://enketo.org/">Enketo Express&lt;/a> seemed to be a good candidate.
The source code is available on &lt;a href="https://github.com/enketo/enketo-express">GitHub - enketo/enketo-express&lt;/a> and the version we assessed was the &lt;a href="https://github.com/enketo/enketo-express/releases/tag/6.2.1">version 6.2.1&lt;/a>, built with the official Dockerfiles.&lt;/p>
&lt;p>Enketo is a cross platform software used to (quoting):&lt;/p></description></item></channel></rss>