GreHack 2021 - Optimizing Server Side Template Injections payloads for jinja2 (EN)

preview_player
Показать описание
When attacking Python-based web applications, we often need to find a way to execute commands on the server and escape from the application context. In order to get access to the underlying Python backend of a web application, an attacker can exploit common vulnerabilities such as Server Side Template Injection (SSTI) or Code Injections (CI) but how can we escape from this context?

In this talk, we will deep dive into the template engine jinja2 in order to create the shortest payloads to access the os module from within a template!

#Pentesting #Python #jinja2
Рекомендации по теме
Комментарии
Автор

Eline Sağlık gardaşım çok güzel anlattın thanks.

tonymontana