-
Notifications
You must be signed in to change notification settings - Fork 182
Client Side Template Injection (CSTI)
Sam Sanoop edited this page Dec 21, 2022
·
1 revision
Client-side template injection vulnerabilities arise when applications using a client-side template framework dynamically embed user input in web pages.
The welcome page of the DVWS application is vulnerable to CSTI. This can be exploited by creating a user with the following payload.
{{'a'.constructor.prototype.charAt=[].join;$eval('x=alert(1)');}}
- XML External Entity Injection
- Server Side Request Forgery (SSRF)
- Username Enumeration
- NoSQL Injection
- Insecure Direct Object Reference
- Mass Assignment
- Cross Site Scripting (XSS)
- Hidden API Functionality Exposure
- SQL Injection
- Information Disclosure
- Insecure PostMessage Configuration
- Command Injection
- Prototype Pollution
- JSON Hijacking
- XPath Injection
- Cross Origin Resource-Sharing Misonfiguration
- JWT Secret Key Brute Force
- Vertical Access Control
- Horizontal Access Control
- Open Redirect
- Path Traversal
- Unsafe Deserialization
- Sensitive Data Exposure
- Arbitrary File Write
- Introspection Enabled
- GraphQL Access Control Issues
- GraphQL Batching Brute Force
- Client Side Template Injection