SSTI

Server Side Template Injection

ko-fi

Detection

${{<%[%'"}}@{%\.#{<%=
${{<%[%'"}}%\.
${{{<%[‘\’}}}

Error Message ? => SSTI confirmed

Fingerprint your template AND create a POC:

Nuclei Template

https://github.com/coffinxp/priv8-Nuclei/blob/main/reflection-ssti.yaml

Payloads

Django Templates engine

Cross-site scripting

Debug information leak

Leaking app’s Secret Key (assumes CookieStorage being first message storage)

Admin Site URL leak

Admin username & password hash leak (assumes admin_log records exist)

Only username

Only password

Jinja2

Index may vary depending on the target. Here index 51 is i and index34 is d == id

https://www.youtube.com/watch?v=FVm6wYc1S6A

https://x.com/podalirius_/status/1655970628648697860

Objectwalker

RCE - Reverse Shell

WAF Bypass

Mako

PHP

Twig

Smarty

Laravel - Blade

Java

Groovy

Freemarker

ASP.NET - Razor

Tools

Go-Recon

gr-ssti:

Tplmap

SSTImap

SSTI-Detector

Interesting Books

Interesting Books

Disclaimer: As an Amazon Associate, I earn from qualifying purchases. This helps support this GitBook project at no extra cost to you.

Support

ko-fi

buymeacoffee

Resources

Last updated