πŸ“Œ Lab Info

This lab contains a blind OS command injection vulnerability in the feedback function.

πŸ› οΈ The application executes a shell command using user-supplied input, but the output is not shown in the response.

However, you can redirect output to a file using shell operators.

There’s a writable folder on the server

/var/www/images/

The application serves image files from this path β€” meaning we can inject output there and access it from the browser.


🎯 Goal

Execute the whoami command and retrieve its output via the browser


Exploitation Steps

1️⃣ Navigate to Feedback Page


2️⃣ Intercept the Request (e.g., using BurpSuite)

Inject into the email field as follows

email = & whoami > /var/www/images/output.txt &
# encoded this parameter and send the requests with ctrl+u

3️⃣ πŸ›‘NO Output