Server Side Attacks - Hack The Box Skills Assessment

Jun Takemura · March 9, 2025

Obtain the flag

The page looked like having lots of functions, but they were dummies.

Examining the request with burp on, I found this:

POST / HTTP/1.1
Host: 94.237.53.146:35348
Content-Length: 45
User-Agent: Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/133.0.0.0 Safari/537.36
Content-Type: application/x-www-form-urlencoded
Accept: */*
Origin: http://94.237.53.146:35348
Referer: http://94.237.53.146:35348/
Accept-Encoding: gzip, deflate, br
Accept-Language: en-US,en;q=0.9
Connection: keep-alive

api=http://truckapi.htb/?id%3DFusionExpress02

A post request to the endpoint api=http://truckapi.htb/id?%3DFusionExpress02

The server reseponse:

HTTP/1.1 200 OK
Date: Sun, 09 Mar 2025 09:02:07 GMT
Server: Apache/2.4.62 (Debian)
Content-Length: 55
Keep-Alive: timeout=5, max=100
Connection: Keep-Alive
Content-Type: text/html; charset=UTF-8

{"id": "FusionExpress02", "location": "456 Oak Avenue"}

Looks like json data.

Since this module is about server side attacks, I inferred this endpoint could be vulnerable to SSTI.

Identification process below:

api=http://truckapi.htb/?id%3D${7*7}
NO

api=http://truckapi.htb/?id%3D
YES

api=http://truckapi.htb/?id%3D
YES

So it’s either Jinja2 or Twig.

Tried this payload:


This didn’t return anything.


This returned "__string_template__0177c07c1ce875b2c81f5871e3da1c28" so it’s Twig.

Sent this RCE payload:


Needed to url encode it (I deleted unnecessary spaces):


For space, %20 didn’t work so I used %20 (it’s +).

This assessment was rather simple.

Twitter, Facebook