8000 GitHub - 5up3rc/tplmap: Automatic Server-Side Template Injection Detection and Exploitation Tool
[go: up one dir, main page]
More Web Proxy on the site http://driver.im/
Skip to content
/ tplmap Public
forked from epinna/tplmap

Automatic Server-Side Template Injection Detection and Exploitation Tool

Notifications You must be signed in to change notification settings

5up3rc/tplmap

 
 

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 

Repository files navigation

Tplmap

Tplmap (short for Template Mapper) is a tool that automate the process of detecting and exploiting Server-Side Template Injection vulnerabilities (SSTI).

This can be used by developers, penetration testers, and security researchers to detect and exploit vulnerabilities related to the template injection attacks.

The technique can be used to compromise web servers' internals and often obtain Remote Code Execution (RCE), turning every vulnerable application into a potential pivot point.

The modular approach allows any contributor to extend the support to other templating engines or introduce new exploitation techniques. The majority of the techniques currently implemented came from the amazing research done by James Kett, PortSwigger.

The application is currently under heavy development and misses some functionalities.

Supported template engines

Template engine Detection command execution Code evaluation File read File write
Mako yes yes python yes yes
Jinja2 yes yes python yes yes
Jade yes yes javascript yes yes
Smarty (unsecured) yes yes PHP yes yes
Freemarker yes yes no yes yes
Velocity yes no no no no
Twig yes no no no no
Smarty (secured) yes no no no no

About

Automatic Server-Side Template Injection Detection and Exploitation Tool

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published

Languages

  • Python 81.2%
  • 3232
  • Shell 11.2%
  • Java 4.8%
  • PHP 1.4%
  • Other 1.4%
0