Command Injection

Command Injection

PHP Command Injection

The following PHP code snippet is vulnerable to a command injection attack:

The following request is an example of that will successful attack on the previous PHP code, and will output the results of the id command: http://127.0.0.1/delete.php?filename=bob.txt;id. Look for exposed $_GET['filename'] type variables that take input from the user, or can be injected into from the URL. This combined with system("<command>") will allow for command injection.

Last updated