Forum Discussion
Pen Test CTFs: Jinja2 Exploitation
- 3 months ago
Team,
Thank you for reaching out in some manner. The lab is surprisingly straightforward.... once you understand the vulnerability. Over the past week, this has been my soul focus and what I have learnt is so valuable.
With regards to the CTF itself, the questions truly lead you to the answer. I had most of the answers but i had to work out how to use them and for that, I had to understand them. I spent so long punished by the limited characters and adding the 'space', that I didn't even think of using the answer to 'module.function' .
Then it clicked.What could of been a 20 minute adventure has lead to some serious research and a real sense of achievement.
I can't say the answers were solutions but certainly honorable suggestions:Netcat's -
most likely the answer lies in question "8 What Python module and function allows you to access arguments in the query string?
Steven's -
learn, how you can access the config register
Config, Strings, Objects and Variables for the win.
puuuh... hard to tell you, without telling you :)
what will help you is for sure: google for jinja2 template exploits. learn, how you can access the config register, etc.
later you'll find out that you'll be limited (see Q2) and find a way around the issue.
here's my linklist what I've read to solve this lab:
- https://www.onsecurity.io/blog/server-side-template-injection-with-jinja2/
- https://jinja.palletsprojects.com/en/stable/templates/#escaping
- https://anakint.medium.com/digital-overdose-2021-autumn-ctf-writeup-madlib-web-c51c5ded5260
- https://wassila-chtioui.com/post/yogosha-ctf23/
- http://167.86.82.176/yogosha_christmas_2023/
- https://def.camp/wp-content/uploads/dc2023/Remi%20Gascou.pdf
- https://blog.quentinra.dev/cybersecurity/red-team/s3.exploitation/vulns/injection/ssti.md
- https://niebardzo.github.io/2020-11-23-exploiting-jinja-ssti/
- https://forum.hackthebox.com/t/jinja2-ssti-filter-bypass-help-needed/3482/11
This might give you some indications, how to tacke the lab.