- Use Burp Suite to intercept and modify the request that submits feedback.
- Now use Burp Suite to intercept and modify the request that loads an image of a product.
filenameparameter, changing the value to the name of the file you specified for the output of the injected command:
- Observe that the response contains the output from the injected command.
Lab: Blind OS command injection with output redirection
This lab contains a blind OS command injection vulnerability in the feedback function.
The application executes a shell command containing the user-supplied details. The output from the command is not returned in the response. However, you can use output redirection to capture the output from the command. There is a writable folder at:
The application serves the images for the product catalog from this location. You can redirect the output from the injected command to a file in this folder, and then use the image loading URL to retrieve the contents of the file.
To solve the lab, execute the
whoami command and retrieve the output.