webmedium

RevengeNinja

hackerlab

Task: a FastAPI preview endpoint rendered attacker-controlled Jinja2 templates inside SandboxedEnvironment with a live Pydantic user object in context. Solution: abuse exposed BaseModel.parse_raw(..., content_type=\"application/pickle\", allow_pickle=True) to deserialize a malicious pickle, gain RCE, and read the flag file.

$ ls tags/ techniques/
ssti_jinja2sandbox_bypass_via_exposed_object_methodspickle_deserialization_rcefile_write_rce

🔒

Permission denied (requires tier.pro)

Sign in to access full writeups

Create a free account with GitHub to get started.

$ssh [email protected]