WM04 - 250pts
Last updated
Was this helpful?
Last updated
Was this helpful?
Visit the Italian dish suggestion site at and find a way to get the flag.
Try with {{'7'*7}}
, which outputs 7777777
so the script is vulnerable. Note that editing and sending these requests is much easier using Burp Suite's repeater (intercept a request and right click then choose "Sent to repeater").
Crash the script with {{foo()}}
to get a stacktrace:
There is a template
variable passed to the render
function for the template. Let's send a request for {{template}}
to print the contents of the template
/flag
variable. This shows the flag.
t3mpl4te_vu1n