{"detect":{"cwe":"CWE-1336","exploit_examples":["/sandboxed/?greeting={{ dump_diagnostics() }}"],"notes":"The sandbox is intact \u2014 textbook attribute-walk RCE is blocked. The bug is the helper. Tools that only test for raw sandbox escape miss this class entirely.","owasp":"A03:2021 \u2014 Injection (SSTI)","scanner_should_fire":true,"sinks":["SandboxedEnvironment + over-privileged registered global"],"subtype":"jinja2-sandbox-bypass-via-exposed-global","success_markers":["VULNLAB{ssti-jinja2-sandbox-bypassed-via-helper}"],"tags":["jinja2","sandbox","registered-global","design-flaw"]},"lab_url":"/sandboxed/","sink":"SandboxedEnvironment + over-privileged registered global","slug":"sandboxed","source_url":"/source/sandboxed","summary":"Sandbox blocks the textbook RCE chain. A registered global ruins it.","title":"Jinja2 SSTI inside a SandboxedEnvironment","vulnerable":true}
