SSTI2 PicoCTF: Web Exploitation | walkthrough

SSTI2 PicoCTF: Web Exploitation | walkthrough

Last updated: July 09, 2025

Hi everyone! In this walkthrough, we will explore the SSTI2 Web Exploitation (Medium Level) Challenge. Let’s go!

SSTI2 PicoCTF

So just launch the Instance. After launching it, you will see a web page like:

SSTI2 PicoCTF

As from the Challenge name, its actually a server-side template injection (SSTI), which is a template injection when an attacker can use native template syntax to inject a malicious payload into a template, which is then executed server-side.

We can try first:

SSTI2 PicoCTF

The output is:

SSTI2 PicoCTF

So the application is vulnerable to SSTI, and the template engine being used is Jinja2 (Python Flask/Django)

So let’s try to print all the files in that directory:

The output will be:

SSTI2 PicoCTF

We can see that we have the “flag” file, so let’s print out the flag!

SSTI2 PicoCTF

Here is your flag! Thanks for reading

Leave a Comment

Your email address will not be published. Required fields are marked *