A penetration testing tool that detects and exploits Server-Side Template Injection (SSTI) and code injection vulnerabilities.
Tplmap is an offensive security tool designed to identify and exploit Server-Side Template Injection (SSTI) and code injection vulnerabilities in web applications. It helps security researchers and penetration testers gain access to the underlying operating system by leveraging sandbox escape techniques across multiple template engines.
Security researchers and penetration testers conducting web application security assessments who need to detect and exploit template injection vulnerabilities.
Developers choose Tplmap for its comprehensive multi-engine detection across over 15 template engines and its sophisticated sandbox escape techniques that enable remote code execution, file system access, and shell capabilities during security testing.
Server-Side Template Injection and Code Injection Detection and Exploitation Tool
Open-Awesome is built by the community, for the community. Submit a project, suggest an awesome list, or help improve the catalog on GitHub.
Automatically tests for SSTI across over 15 template engines, including Jinja2, Mako, and Twig, as detailed in the supported engines table, making it comprehensive for diverse web applications.
Implements advanced methods to bypass sandbox restrictions, based on public research and original contributions, enabling remote code execution and system access in vulnerable contexts.
Provides robust features like shell access, file read/write, and command execution, demonstrated in the exploitation examples with options for reverse/bind shells and file uploads.
Handles scenarios where injection results are not directly visible in responses, as mentioned in the key features, allowing exploitation in challenging black-box testing environments.
The README explicitly states the project is unmaintained, meaning it lacks updates for new vulnerabilities, template engines, or security patches, reducing its long-term reliability.
The supported engines table shows that newer versions of some engines like Twig (>1.19) and Dust are not exploitable, making it ineffective against updated or secured applications.
Requires running a test suite and may involve manual configuration, especially for the Burp Suite plugin, as hinted in the documentation, which can be time-consuming for quick assessments.