# Lab: Basic server-side template injection

We have the following web page

<figure><img src="https://251574581-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FlTgE7hbyi7mSyXsMcq44%2Fuploads%2FijryiHTuZXsGU94RQtqq%2Fimage.png?alt=media&#x26;token=fdbdea2a-bafd-4b39-8619-e6310788d8a1" alt=""><figcaption></figcaption></figure>

We see the message "Unfortunately this product is out of stock"\
The template generator it says that is ERB. Looking for payloads we found.

<figure><img src="https://251574581-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FlTgE7hbyi7mSyXsMcq44%2Fuploads%2FpnW3o0cysbSvqXxQX52K%2Fimage.png?alt=media&#x26;token=8d321a35-b7f8-45f8-bf03-f10b225563b5" alt=""><figcaption></figcaption></figure>

Trying we got it

<figure><img src="https://251574581-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FlTgE7hbyi7mSyXsMcq44%2Fuploads%2F6kauF5hWZZwq4ImJRqgq%2Fimage.png?alt=media&#x26;token=7efb40e1-4e78-4d60-8922-7539f2ef89ee" alt=""><figcaption></figcaption></figure>

<figure><img src="https://251574581-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FlTgE7hbyi7mSyXsMcq44%2Fuploads%2F6jjEOcMEHJh1l8PnVW02%2Fimage.png?alt=media&#x26;token=8677bc8f-de9f-45cf-89a5-4b8e135af4b4" alt=""><figcaption></figcaption></figure>

So let's execute RCE for deleting morale.txt

<figure><img src="https://251574581-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FlTgE7hbyi7mSyXsMcq44%2Fuploads%2FwnicHFkP1i7rhDiywg83%2Fimage.png?alt=media&#x26;token=ecdcc1a5-566c-42c9-bb90-d8421274099d" alt=""><figcaption></figcaption></figure>

<figure><img src="https://251574581-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FlTgE7hbyi7mSyXsMcq44%2Fuploads%2FUQBocTq5dbVumiIiLWXV%2Fimage.png?alt=media&#x26;token=3c66b9d3-37d7-4f34-89ae-10555b3b8eba" alt=""><figcaption></figcaption></figure>

<figure><img src="https://251574581-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FlTgE7hbyi7mSyXsMcq44%2Fuploads%2FzNWIVLIKQEq2FZdNSHAs%2Fimage.png?alt=media&#x26;token=a0e1d778-fb2a-4bf9-8293-da5355e59b9f" alt=""><figcaption></figcaption></figure>
