SSTI: engine detection

This commit is contained in:
Alexandre ZANNI 2024-11-01 22:20:50 +01:00 committed by GitHub
parent 6b8ca37452
commit eca0bd1b36
No known key found for this signature in database
GPG Key ID: B5690EEEBB952194

View File

@ -73,6 +73,7 @@ Based on the successful response, the attacker determines which template engine
* **Java**: Freemarker, Jinjava, Velocity, ... * **Java**: Freemarker, Jinjava, Velocity, ...
* **Ruby**: ERB, Slim, ... * **Ruby**: ERB, Slim, ...
[This post](https://medium.com/@0xAwali/template-engines-injection-101-4f2fe59e5756) summurize the syntax and detection method for most of the template engines for JavaScript, Python, Ruby, Java and PHP and how to differentiate between engines that use the same syntax.
### Escalate to Code Execution ### Escalate to Code Execution