webProeasy
Странный сервер (Strange Server)
hackerlab
Task: Web application with URL reflection on /same page. Solution: Exploited Jinja2 SSTI vulnerability using url_for.__globals__ to achieve RCE and read the flag.
$ ls tags/ techniques/
Server-Side Template Injection (SSTI) in Jinja2RCE via url_for.__globals__['__builtins__']['__import__']('os').popen()URL reflection vulnerability detection
🔒
Permission denied (requires tier.pro)
Sign in to access full writeups
Sign in with GitHub to continue. No email required.
$sign in$ grep --similar
Similar writeups
- [web][Pro]Simple Web (d5c47306-5d4f-4ad4-958f-5414a0b85b9b)— hackerlab
- [web][Pro]Minefield— hackerlab
- [web][Pro]В поисках капибары — Hackerlab— hackerlab
- [web][Pro]Состояние 0x7F— hackerlab
- [web][Pro]Обычная страница— hackerlab