About 336 results
Open links in new tab
  1. OS command injection - PortSwigger

    In this section, we explain what OS command injection is, and describe how vulnerabilities can be detected and exploited. We also show you some useful commands and techniques for different …

  2. OS command injection - PortSwigger

    OS command Injection is a critical vulnerability that allows attackers to gain complete control over an affected web site and the underlying web server. OS command injection vulnerabilities arise when an …

  3. OS command injection - PortSwigger

    Dec 16, 2025 · OS command injection is a vulnerability that enables an attacker to execute arbitrary operating system (OS) commands on the server that is running an application.

  4. Lab: OS command injection, simple case - PortSwigger

    This lab contains an OS command injection vulnerability in the product stock checker. The application executes a shell command containing user-supplied product and store IDs, and returns the raw …

  5. Testing for OS command injection vulnerabilities - PortSwigger

    Dec 16, 2025 · OS command injection is a vulnerability that enables an attacker to execute arbitrary operating system (OS) commands on the server that is running an application. This can fully …

  6. Testing for asynchronous OS command injection ... - PortSwigger

    Dec 16, 2025 · Burp Collaborator can help you to test for asynchronous command injection vulnerabilities. You can use Burp to inject a command that triggers an out-of-band network …

  7. Lab: Blind OS command injection with time delays - PortSwigger

    This lab contains a blind OS command injection vulnerability in the feedback function. The application executes a shell command containing the user-supplied details.

  8. Exploiting OS command injection vulnerabilities to exfiltrate data with ...

    Dec 16, 2025 · Identify a request that is vulnerable to asynchronous OS command injection. For more information, see Testing for asynchronous OS command injection vulnerabilities with Burp Suite.

  9. Using Burp to Test for OS Command Injection Vulnerabilities

    An OS command injection attack occurs when an attacker attempts to execute system level commands through a vulnerable application. A successful attack could potentially violate the entire access …

  10. Lab: Blind OS command injection with output redirection

    This lab contains a blind OS command injection vulnerability in the feedback function. The application executes a shell command containing the user-supplied details.