Command injection
Allow to execute arbitrary system commands on a host operating system via a vulnerable application. Normally happens when a web application takes a user-supplied input and passes it directly to a shell interpreter.
We can find a typical example of this vulnerability as follows:
When internally using functions like system or shell_exec which pass input to an internal command interpreter
In some cases, the application will receive input and redirect it to an internal command executed in the server shell
We can abuse this input to add other commands using the command operators
Sometimes it could be sanitized to detect these symbols, so to avoid detection, we can combine operators and commands into a single string, which helps bypass filtering
Last updated
Was this helpful?