tplmap
Server-Side Template Injection and Code Injection Detection and Exploitation Tool
Details
Category: Vulnerabilities
Publisher: trickest
Created Date: 9/7/2021
Container: quay.io/trickest/tplmap:6f21501
Source URL: https://github.com/epinna/tplmap
Parameters
Command:
--url
- Target URL.Command:
--proxy
- Use a proxy to connect to the target URLCommand:
-c
- Cookies (e.g. 'Field1=Value1').Command:
-H
- Extra headers (e.g. 'Header1: Value1').Command:
--tpl-code
- Inject code in the template engine.Command:
--data
- Data string to be sent through POST. It must be as query string: param1=value1¶m2=value2.Command:
-t
- Techniques R(endered) T(ime-based blind). Default: RT.Command:
-A
- HTTP User-Agent header value.Command:
--force-level
- Force a LEVEL and CLEVEL to test.Command:
-X
- Force usage of given HTTP method (e.g. PUT).Command:
--upload
- Upload file to target.Command:
--injection-tag
- Use string as injection tag (default '*').Command:
-e
- Force back-end template engine to this value.Command:
--os-cmd
- Execute an operating system command.Command:
--level
- Level of code context escape to perform (1-5, Default:1).Command:
--force-overwrite
- Force file overwrite when uploading.