Click Htb Writeup -

tar -czf /backups/click_backup.tar.gz /home/click/* Wildcard in tar with --checkpoint and --checkpoint-action can be exploited.

/login /dashboard /forgot-password /test The /test endpoint is promising. Discovering SSTI The /test endpoint accepts a parameter ?name= . Submitting {{7*7}} returns 49 in the response → Server-Side Template Injection (Jinja2). Confirming Execution Payload: {{ config }} → Leaks Flask configuration, confirming Jinja2. Gaining RCE Jinja2 SSTI to RCE: click htb writeup

Running it shows it creates a backup of /home/click to /backups/click_backup.tar.gz using tar with wildcard. The command likely is: tar -czf /backups/click_backup

Top