Lab 13: OS command injection, simple case

 This lab contains an OS command injection vulnerability in the product stock checker.



I start by going to a product and then trying to request the stock. Since this deals with the backend I can use this to inject an OS command and get information.



Here I changed the values of the productId to the whoami command and it became URL-encoded







I found out that I could’ve also done the OS injection like this.



This would have also worked

Comments

Popular posts from this blog

Active Directory Home Lab

Vulnerability Management(Nessus)

TightVNC and Colasoft Packet Builder Lab

Practitioner Lab 2: File path traversal, traversal sequences stripped non-recursively