Lab 13: OS command injection, simple case

 This lab contains an OS command injection vulnerability in the product stock checker.



I start by going to a product and then trying to request the stock. Since this deals with the backend I can use this to inject an OS command and get information.



Here I changed the values of the productId to the whoami command and it became URL-encoded







I found out that I could’ve also done the OS injection like this.



This would have also worked

Comments

Popular posts from this blog

Practitioner Lab 1: File path traversal, traversal sequences blocked with absolute path bypass

Practitioner Lab 7: SSRF with filter bypass via open redirection vulnerability

Practitioner Lab 4: File path traversal, validation of start of path

Practitioner Lab 5:File path traversal, validation of file extension with null byte bypass