webProeasy

MailPilot — SSTI in Template Preview

hackadvisor

Task: Flask/Jinja2 email marketing platform with template preview feature that renders user-supplied templates via render_template_string(). Solution: Exploited SSTI through lipsum.__globals__['os'].popen() to read /tmp/flag.txt.

$ ls tags/ techniques/
ssti_jinja2rce_via_lipsum_globalstemplate_preview_abuse

🔒

Permission denied (requires tier.pro)

Sign in to access full writeups

Sign in with GitHub to continue. No email required.

$sign in

$ grep --similar

Similar writeups