SSTImap
SSTImap is an automatic SSTI detection tool with an interactive interface that checks websites for Server-Side Template Injection vulnerabilities and exploits them to gain operating system access.
Description
SSTImap is a penetration testing software designed to detect and exploit Code Injection and Server-Side Template Injection (SSTI) vulnerabilities in websites. It operates in both predetermined and interactive modes, allowing testers to identify vulnerable injection points across query parameters, body data, headers, and cookies. Once a vulnerability is detected, SSTImap can provide interactive shells on the template engine, its base language, or even the underlying operating system.
Use cases include security assessments of web applications using template engines, where SSTI vulnerabilities could lead to remote code execution. Testers can crawl websites to discover forms and URLs, customize detection levels, and apply various techniques like rendered, error-based, boolean blind, and time-based blind testing. The tool supports proxy usage, custom user agents, and detailed logging for thorough analysis.
It features a modular design with configurable engines and payloads, making it suitable for both automated scans and manual exploitation during pentests.
How It Works
SSTImap sends requests with injection markers (default '*') to specified injection points (query, body, headers, cookies) and analyzes responses for SSTI indicators using techniques like rendered output, error-based, boolean blind, and time-based blind detection across multiple escaping levels (1-5). It supports template engines via backend modules and escalates confirmed vulnerabilities to interactive shells using template code injection, base language evaluation, or OS command execution. Crawling discovers additional targets, forms are parsed and tested, with customizable request methods, data types, delays, and proxies.
Installation
sudo apt install sstimapFlags
Examples
sstimap -hsstimap -u 'https://example.com/?name=test'sstimap -isstimap --load-urls urls.txtsstimap -u 'https://example.com' -c 2sstimap -u 'https://example.com' -fsstimap -u 'https://example.com' -tsstimap -u 'https://example.com' -s