This vulnerability can be found in email templates, blogs, forums, comments, wikis
*pay extra attention when evaluting these functionalities in a web application*
Whenever you come across these frameworks, consider testing the application for SSTI
Identify the application’s built-in language and the running template engine.
Identify injectable user-controlled inputs in GET and POST requests.
Ex: <http://example.com/{{7*7}>}
Ex: <http://example.com/home?name={{7*7}>}
Fuzz the application with special characters ${{<%[%'"}}%\\.
Observe which ones get interpreted by the server and which ones raise errors.
Insert basic template injection payloads in all user inputs, and observe if the application engine evaluates them.
${{7*7}}
${7*7}
<%= 7*7 %>
#{7*7}
*{{‘7’7}}
.{{7*7}}
*If the application calculates the numbers, it means it is vulnerable*