-
Notifications
You must be signed in to change notification settings - Fork 104
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
quick fix for jinja2 non blind shell capabilities #44
Comments
Can you describe, what was the problem and what was changed? |
TBH i didn't try to debug the old payloads of this plugin nor to deep understand the code of the tool. |
Can you share the source code of the vulnerable web application? |
I tested it on a non-public support. |
Those 4 payloads are the shortest: |
The OS-Shell mode of your tool is awesome |
Can you try running SSTImap with a proxy (e.g. BurpSuite) and send the relevant parts of the last couple responses with the original plugin? |
request_1: request_2: response_2 : The plugins/engines/jinja2.py injection is added to this of plugins/languages/python.py. |
If i modify this regexp, a third request is made : response: |
Thank you for your help! It seems like all the extra spaces and newlines were not properly trimmed. I woud change the payload to a shorter one in the next version. The old payload would probably go into the |
Cool. |
The text was updated successfully, but these errors were encountered: