Skip to content

OS command injection

Alnoman Kamil edited this page May 14, 2024 · 24 revisions

APPRENTICE

- lab: OS command injection, simple case

This lab contains an OS command injection vulnerability in the product stock checker.
The application executes a shell command containing user-supplied product and store IDs, and returns the raw output from the command in its response.
To solve the lab, execute the whoami command to determine the name of the current user.

  1. Burp Suite is used to intercept when pressing Check stock.

  2. By modifying the POST request as shown in the image we pass the lab.

    Screenshot 2024-05-15 at 00 31 38

Clone this wiki locally