SSTI
Server Side Template Injection
Detection
${{<%[%'"}}@{%\.#{<%=${{<%[%'"}}%\.${{{<%[‘\’}}}Error Message ? => SSTI confirmed

Fingerprint your template AND create a POC:
Nuclei Template
https://github.com/coffinxp/priv8-Nuclei/blob/main/reflection-ssti.yaml
Payloads
Django Templates engine
Cross-site scripting
Debug information leak
Leaking app’s Secret Key (assumes CookieStorage being first message storage)
Admin Site URL leak
Admin username & password hash leak (assumes admin_log records exist)
admin_log records exist)Only username
Only password
Jinja2
Index may vary depending on the target. Here index 51 is i and index34 is d == id
https://www.youtube.com/watch?v=FVm6wYc1S6A
https://x.com/podalirius_/status/1655970628648697860
Objectwalker
RCE - Reverse Shell
WAF Bypass
Mako
PHP
Twig
Smarty
Laravel - Blade
Java
Groovy
Freemarker
ASP.NET - Razor
Tools
Go-Recon
gr-ssti:
Tplmap
SSTImap
SSTI-Detector
Interesting Books
Interesting BooksThe Web Application Hacker’s Handbook The go-to manual for web app pentesters. Covers XSS, SQLi, logic flaws, and more
Bug Bounty Bootcamp: The Guide to Finding and Reporting Web Vulnerabilities Learn how to perform reconnaissance on a target, how to identify vulnerabilities, and how to exploit them
Real-World Bug Hunting: A Field Guide to Web Hacking Learn about the most common types of bugs like cross-site scripting, insecure direct object references, and server-side request forgery.
Support
Resources
Last updated


