bug-slash1. OS command injection, simple case

Lets open the vulnerable lab:

Move around:

We have a post request lets test the parameters:

We will URL encode it:

And we have command execution.

Lets run whoami to complete the lab:

Solve it using a python3 script:

Last updated