Lab 13: OS command injection, simple case
This lab contains an OS command injection vulnerability in the product stock checker.
I start by going to a product and then trying to request the stock. Since this deals with the backend I can use this to inject an OS command and get information.
Here I changed the values of the productId to the whoami command and it became URL-encoded
I found out that I could’ve also done the OS injection like this.
This would have also worked
Comments
Post a Comment