webmedium
RevengeNinja
hackerlab
Task: a FastAPI preview endpoint rendered attacker-controlled Jinja2 templates inside SandboxedEnvironment with a live Pydantic user object in context. Solution: abuse exposed BaseModel.parse_raw(..., content_type=\"application/pickle\", allow_pickle=True) to deserialize a malicious pickle, gain RCE, and read the flag file.
$ ls tags/ techniques/
ssti_jinja2sandbox_bypass_via_exposed_object_methodspickle_deserialization_rcefile_write_rce
🔒
Permission denied (requires tier.pro)
Sign in to access full writeups
Create a free account with GitHub to get started.
$ssh [email protected]