webPromedium

Lab 237 — MailCraft — SSTI in Email Template Preview

hackadvisor

Task: email marketing platform (MailCraft) with server-side Jinja2 template preview — SSTI in preview endpoint. Solution: inject {{lipsum.__globals__['os'].popen('env').read()}} via POST /api/templates/1/preview to achieve RCE and read FLAG environment variable.

$ ls tags/ techniques/
ssti_jinja2decoy_flag_recognitionrce_via_lipsum_globalstemplate_preview_abuseenv_variable_exfiltration

🔒

Permission denied (requires tier.pro)

Sign in to access full writeups

Sign in with GitHub to continue. No email required.

$sign in

$ grep --similar

Similar writeups