Skip to content

Commit

Permalink
Merge pull request swisskyrepo#521 from mh4ckt3mh4ckt1c4s/ssti-detection
Browse files Browse the repository at this point in the history
Add SSTI detection payload + related resource
  • Loading branch information
swisskyrepo committed Aug 9, 2022
2 parents 11271d9 + 9d274a3 commit 683167d
Showing 1 changed file with 8 additions and 0 deletions.
8 changes: 8 additions & 0 deletions Server Side Template Injection/README.md
Original file line number Diff line number Diff line change
Expand Up @@ -89,6 +89,13 @@ python2.7 ./tplmap.py -u "http://192.168.56.101:3000/ti?user=InjectHere*&comment
![SSTI cheatsheet workflow](https://github.com/swisskyrepo/PayloadsAllTheThings/blob/master/Server%20Side%20Template%20Injection/Images/serverside.png?raw=true)

---
## Detection

In most cases, this polyglot payload will trigger an error in presence of a SSTI vulnerability :

```
${{<%[%'"}}%\.
```

## ASP.NET Razor

Expand Down Expand Up @@ -881,3 +888,4 @@ $str.valueOf($chr.toChars($out.read()))
* [Handlebars template injection and RCE in a Shopify app ](https://mahmoudsec.blogspot.com/2019/04/handlebars-template-injection-and-rce.html)
* [Lab: Server-side template injection in an unknown language with a documented exploit](https://portswigger.net/web-security/server-side-template-injection/exploiting/lab-server-side-template-injection-in-an-unknown-language-with-a-documented-exploit)
* [Exploiting Less.js to Achieve RCE](https://www.softwaresecured.com/exploiting-less-js/)
* [A Pentester's Guide to Server Side Template Injection (SSTI)](https://www.cobalt.io/blog/a-pentesters-guide-to-server-side-template-injection-ssti)

0 comments on commit 683167d

Please sign in to comment.