webPromedium
MailPulse
hackadvisor
Task: MailPulse email marketing platform with Smarty template engine editor and preview endpoint vulnerable to SSTI. Solution: Inject {system(\"cat /root/flag.txt\")} via template preview API to achieve RCE and read the flag, bypassing {fetch} tag path restrictions.
$ ls tags/ techniques/
decoy_flag_recognitionssti_smarty_system_tagrce_via_template_enginesmarty_math_confirmationfetch_tag_bypass_via_system
🔒
Permission denied (requires tier.pro)
Sign in to access full writeups
Sign in with GitHub to continue. No email required.
$sign in$ grep --similar
Similar writeups
- [web][Pro]Lab 225 — MailPulse — SSTI in Campaign Template Preview— hackadvisor
- [web][Pro]Lab 225 — MailPulse — SSTI in Campaign Template Preview— hackadvisor
- [web][Pro]Lab 237 — MailCraft — SSTI in Email Template Preview— hackadvisor
- [web][Pro]Lab 130 — LearnPulse — SSTI in Signature Template Engine— hackadvisor
- [web][Pro]SendForge— hackadvisor