Home Free Hacking Tools Tplmap – Open Source Tool to Scan For Server Side Template Injection Vulnerabilities

Tplmap – Open Source Tool to Scan For Server Side Template Injection Vulnerabilities

by Unallocated Author
Tplmap hacking tool

Tplmap is a python tool that can find code injection and Server Side Templates Injection (SSTI) vulnerabilities by using sandbox escape techniques. The tool is capable of utilising a SSTI in a number of template engines to gain access to the target file system or operating system. Some of the supported template engines include PHP (code eval), Ruby (code eval), JaveScript (code eval), Python (code eval), ERB, Jinja2, and Tornado. The tool can execute blind injections against these template engines with capability of executing remote commands.

Installing Tplmap

tplmap cloning

Tplmap can be installed by cloning the tool from github repository by using the following github link.

git clone https://github.com/epinna/tplmap

After successful installation, change the directory path to the tplmap setup files to launch tplmap.py.

Testing the Vulnerabilities in Web Applications

Tplmap not only exploits the vulnerabilities of file systems, but also has the capability of accessing the underlying operating system using different parameters. The following screenshot displays different parameter options that can be used in order to access the underlying operating system

tplmap remote system options

The following command can be used to test for vulnerable parameters in the target url.

./tplmap.py -u <'target url'>

Once the command is executed, the tool tests the target url against a number of plugins to find code injection opportunity.

tplmap target scan

If a vulnerability is found, the tool outputs the details about the possible injection points in the target. These include the GET parameter value (whether id or name), template Engine (e.g Tornado), OS (e.g Linux), and injection technique (e.g render, blind).

tplmap confirmed injection

For the vulnerable target operating system, the tplmap command can be re-run with one of the parameters as mentioned earlier. For instance, we can use the –os –shell option with the tplmap command in the following manner.

./tplmap.py --os-shell -u <'target url'>

The –os –shell option launches a pseudo terminal on the target operating system to execute desired codes.

What Bunny rating does it get?

Tplmap not only scans the vulnerabilities but the same tool provides the option to exploit the target too. The exploitation feature is helpful for penetration testing, as a result we will be awarding this tool a rating of 4 out of 5 bunnies.

Want to learn more about ethical hacking?

We have a  networking hacking course that is of a similar level to OSCP, get an exclusive 95% discount HERE

Do you know of another GitHub related hacking tool?

Get in touch with us via the contact form if you would like us to look at any other GitHub ethical hacking tools.

You may also like