Server-Side Template Injection Writeups
Last updated
Last updated
Personal Blog Post:
Orange Tsai discovered a Template Injection on rider.uber.com domain. Changing user name to the payload {{ '7'*7 }}
will return the value '7777777'
in the followup email "Your Uber account information has been updated" notification.
The billing_first_name body parameter on the POST /wp-admin/admin-ajax.php route is vulnerable to Template Injection which allows Stored XSS on the account page.
The Stored XSS is returned on the accounts page https://mercantile.wordpress.org/my_account:
Researcher discovered on of the fields on the user invite page was vulnerable to Template Injection. Upon entering {7*7} into all the fields for registration a verbose error message is returned in the email message notification, revealing a Smarty Template engine message.
Further exploited using a php payload to extract the /etc/passwd file: