mirror of
https://github.com/swisskyrepo/PayloadsAllTheThings
synced 2025-12-06 08:54:40 +01:00
SSTI: engine detection
This commit is contained in:
parent
6b8ca37452
commit
eca0bd1b36
1 changed files with 1 additions and 0 deletions
|
|
@ -73,6 +73,7 @@ Based on the successful response, the attacker determines which template engine
|
|||
* **Java**: Freemarker, Jinjava, Velocity, ...
|
||||
* **Ruby**: ERB, Slim, ...
|
||||
|
||||
[This post](https://medium.com/@0xAwali/template-engines-injection-101-4f2fe59e5756) summurize the syntax and detection method for most of the template engines for JavaScript, Python, Ruby, Java and PHP and how to differentiate between engines that use the same syntax.
|
||||
|
||||
### Escalate to Code Execution
|
||||
|
||||
|
|
|
|||
Loading…
Reference in a new issue