OS command injection
Whenever a web app calls out to OS commands (e.g. via a pearl script), malicious commands may be injected. This can potentially lead to a full compromise of the system.
Executing arbitrary commands
Blind command injections
Detecting vulnerabilities using time delays
Exploiting vulnerabilities by redirecting output
Exploiting vulnerabilities using out-of-band (OAST) techniques
Exfiltrate data
Ways of injection
Command separators
Windows and Unix:
&
&&
|
||
Unix only:
;
Newline:
0x0a
orBackticks:
`command`
Dollar character:
$(command)
Last updated