You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
I may have a syntax error as well, but here is the code I used
python3 sstimap.py --method POST -u 'http://ssti.thm:8080/admin/forms/edit/index.php?page=views&group_name_6=%7B%7B7*7&update_views=Update&view_list_sortable__rows=6%7C2&view_list_sortable__new_groups=2&view_list_sortable__deleted_rows=' -C 'PHPSESSID=fc58035f6c36a8a4416bb881d3a295b7' -e SMARTY
It recognized the correct field (group_name_6) to inject the payloads but it would not return the confirmed injection point. I double-checked with curl to verify that I could receive a response from the webpage. After about four hours of troubleshooting I landed here.
here's the curl code i used to double-check the cookie and parameters were not the issue:
Have you tried using group_name_6=* instead of group_name_6=%7B%7B7*7? In SSTImap, * is an injection marker, so SSTImap attempts to insert payloads into the value, but your value creates invalid Smarty syntax (tag is opened but not closed)
The room is located here: https://tryhackme.com/r/room/serversidetemplateinjection
I may have a syntax error as well, but here is the code I used
It recognized the correct field (group_name_6) to inject the payloads but it would not return the confirmed injection point. I double-checked with curl to verify that I could receive a response from the webpage. After about four hours of troubleshooting I landed here.
here's the curl code i used to double-check the cookie and parameters were not the issue:
Also I verified that }*{ broke the page.
Anyway, thanks for the tool! It worked great in the practice room.
The text was updated successfully, but these errors were encountered: