SSTI in Twig
Fuzzing vulnerable payloads in request body and query params to assess Server-Side Template Injection vulnerability.
Server Side Template Injection (SSTI)
How this template works
APIs Selection
The template uses regular expressions to extract the payload key from the request body and query parameters. It matches any key in the request payload or query parameters and extracts the key as "payloadKey" or "queryKey" respectively.
Execute request
The template modifies the query parameter and request body parameter by injecting a Twig template expression. It sets the query parameter "queryKey" to "{{89 * 91}}" and the request body parameter "payloadKey" to "{{89 * 91}}".
Validation
The template validates the response payload by checking if it contains the string "8099". If the response payload contains either "8099", the validation is considered successful.
Frequently asked questions
What is the purpose of the SSTI in Twig test
What are the potential risks associated with successful exploitation of this vulnerability
How does the test assess the risk of arbitrary code execution, data exposure, and server compromise within the Twig templating engine
What is the severity level assigned to this test
What are the categories and subcategories associated with this test
Are there any references or resources available for further understanding of this test
"The text editor in Akto is absolutely remarkable. Its user-friendly YAML format strikes the perfect balance between simplicity and power. With intuitive features like 'API selection filter', 'Execute', Validate' creating test rules becomes incredibly easy. Akto's test editor is a game-changer, enabling seamless creation of highly personalized and effective tests that could meet the needs of any modern day organization. "

Security team,
Rippling