webProeasy
Lab 383 — ConnectFlow — SSTI
hackadvisor
Task: Flask API connector platform with Jinja2-rendered connector descriptions. Solution: SSTI via unsandboxed render_template_string() in description field, escalated to RCE via lipsum.__globals__['os'].popen() to read /root/flag.txt.
$ ls tags/ techniques/
decoy_flag_recognitionjinja2_ssti_via_render_template_stringrce_via_lipsum_globals_os_popen
🔒
Permission denied (requires tier.pro)
Sign in to access full writeups
Sign in with GitHub to continue. No email required.
$sign in$ grep --similar
Similar writeups
- [web][Pro]Lab 389 — PulseBoard — SSTI in Custom Widget Template Builder— hackadvisor
- [web][Pro]Lab 237 — MailCraft — SSTI in Email Template Preview— hackadvisor
- [web][Pro]MailPilot — SSTI in Template Preview— hackadvisor
- [web][Pro]Lab 135 — PageCraft — SSTI in CMS Page Editor— hackadvisor
- [web][Pro]Simple Web (d5c47306-5d4f-4ad4-958f-5414a0b85b9b)— hackerlab