webProeasy

Странный сервер (Strange Server)

hackerlab

Task: Web application with URL reflection on /same page. Solution: Exploited Jinja2 SSTI vulnerability using url_for.__globals__ to achieve RCE and read the flag.

$ ls tags/ techniques/
Server-Side Template Injection (SSTI) in Jinja2RCE via url_for.__globals__['__builtins__']['__import__']('os').popen()URL reflection vulnerability detection

🔒

Permission denied (requires tier.pro)

Sign in to access full writeups

Sign in with GitHub to continue. No email required.

$sign in

$ grep --similar

Similar writeups