Lab 13: OS command injection, simple case

 This lab contains an OS command injection vulnerability in the product stock checker.



I start by going to a product and then trying to request the stock. Since this deals with the backend I can use this to inject an OS command and get information.



Here I changed the values of the productId to the whoami command and it became URL-encoded







I found out that I could’ve also done the OS injection like this.



This would have also worked

Comments

Popular posts from this blog

Vulnerability Management(Nessus)

Active Directory Home Lab

Practitioner Lab 2: File path traversal, traversal sequences stripped non-recursively

TightVNC and Colasoft Packet Builder Lab