Server-Side Template Injection Writeups

Uber - Template Injection Python RCE

Personal Blog Post:

Orange Tsai discovered a Template Injection on rider.uber.com domain. Changing user name to the payload {{ '7'*7 }} will return the value '7777777'in the followup email "Your Uber account information has been updated" notification.

Email notification with the executed template injection payload showing execution on the backend server

WordPress - XSS

The billing_first_name body parameter on the POST /wp-admin/admin-ajax.php route is vulnerable to Template Injection which allows Stored XSS on the account page.

HTTP POST request with Template Injection payload in the billing_first_name body parameter

The Stored XSS is returned on the accounts page https://mercantile.wordpress.org/my_account:

Stored XSS Alert payload executed on the account page

Unikrn - Smarty Template

Researcher discovered on of the fields on the user invite page was vulnerable to Template Injection. Upon entering {7*7} into all the fields for registration a verbose error message is returned in the email message notification, revealing a Smarty Template engine message.

Email response for user invite with {7*7} entered as payload

Further exploited using a php payload to extract the /etc/passwd file:

Contents of /etc/passwd file returned in noreply email

Last updated

Was this helpful?