Avatar

Labs / Template Injector

  • Daily Challenge
  • Released 29 Aug 2025

🔥 Their search function processes templates in real-time - what could go wrong?

SecureBank's advanced search feature boasts dynamic template processing for personalized results. But when user input meets template engines without proper sanitization, the server might just execute more than they bargained for. 🚀 Time to turn their templates against them!

1
Flags
1
Points
Daily Challenge
Solution Available
Free Access
Start Lab Environment

Launch your dedicated AWS machine to begin hacking

~1-2 min setup
AWS dedicated
Private instance
Industry standard
Daily Challenge

🔍 Server-Side Template Injection (SSTI)

Server-Side Template Injection is a critical vulnerability that occurs when user input is embedded into template engines without proper sanitization. This challenge teaches you how to exploit SSTI vulnerabilities to achieve remote code execution and access sensitive system information.

🎯 What You'll Learn
  • ✓ Template injection techniques
  • ✓ Flask/Jinja2 template exploitation
  • ✓ Remote code execution via SSTI
  • ✓ Environment variable extraction
🔍 Challenge Overview

SecureBank's search functionality uses dynamic template rendering with user input. Your mission is to exploit this Server-Side Template Injection vulnerability to execute code on the server and extract the hidden flag from the system environment.

Penetration Testing Context: SSTI vulnerabilities are commonly found in web applications that use template engines like Jinja2, Twig, or Smarty, and can lead to complete server compromise through remote code execution.

First Blood 🩸
3xpl0it3r