Jinja2 2.10 from_string server side template injection Vulnerability / Exploit
/
/
/
Exploits / Vulnerability Discovered : 2019-02-15 |
Type : webapps |
Platform : python
This exploit / vulnerability Jinja2 2.10 from_string server side template injection is for educational purposes only and if it is used you will do on your own risk!
[+] Code ...
'''
# Exploit Title: Jinja2 Command injection from_string function
# Date: [date]
# Exploit Author: JameelNabbo
# Website: Ordina.nl
# Vendor Homepage: http://jinja.pocoo.org
# Software Link: https://pypi.org/project/Jinja2/#files
# Version: 2.10
# Tested on: Kali Linux
# CVE-2019-8341
// from_string function is prone to SSTI where it takes the "source" parameter as a template object and render it and then return it.
//here's an example about the vulnerable code that uses from_string function in order to handle a variable in GET called 'username' and returns Hello {username}:
'''