Hardcore SSTI in Jinja2
I’m doing a web CTF that contains a SSTI vulnerability in a Jinja2 template, so I can use curly brackets. However, every special word like class, base, mro, etc. And every special symbol is filtered except for (),_,%,[] and + sign.
How can I build a exploit that bypasses these filters and do a RCE escape? I didn’t find any reference at Internet and I’m doing for a college job, so this may be inedit.
submitted by /u/Carel3D
[link] [comments]