Skip to content

Commit

Permalink
Bump version
Browse files Browse the repository at this point in the history
  • Loading branch information
epinna committed Jul 13, 2018
1 parent d7fa408 commit 9320546
Show file tree
Hide file tree
Showing 2 changed files with 3 additions and 3 deletions.
4 changes: 2 additions & 2 deletions README.md
Original file line number Diff line number Diff line change
Expand Up @@ -7,7 +7,7 @@ The tool and its test suite are developed to research the SSTI vulnerability cla

The sandbox break-out techniques came from James Kett's [Server-Side Template Injection: RCE For The Modern Web App][10], other public researches [\[1\]][1] [\[2\]][2], and original contributions to this tool [\[3\]][3] [\[4\]][4].

It fully compromises the server exploiting several code context and blind injection scenarios. It also supports _eval()_-like code injections in Python, Ruby, PHP, Java and generic unsandboxed template engines.
It can exploit several code context and blind injection scenarios. It also supports _eval()_-like code injections in Python, Ruby, PHP, Java and generic unsandboxed template engines.

Server-Side Template Injection
------------------------------
Expand Down Expand Up @@ -56,7 +56,7 @@ Tplmap is able to detect and exploit SSTI in a range of template engines to get

```
$ ./tplmap.py -u 'http://www.target.com/page?name=John'
[+] Tplmap 0.3
[+] Tplmap 0.5
Automatic Server-Side Template Injection Detection and Exploitation Tool
[+] Testing if GET parameter 'name' is injectable
Expand Down
2 changes: 1 addition & 1 deletion tplmap.py
Original file line number Diff line number Diff line change
Expand Up @@ -5,7 +5,7 @@
from utils.loggers import log
import traceback

version = '0.4'
version = '0.5'

def main():

Expand Down

0 comments on commit 9320546

Please sign in to comment.