LFI ๐
Linux File Inclussion
Check the
urladding parameterfile

FUZZ it using this command:
If the backend is filtering by checking the input, try this:
Check out the &ext variable and put it empty because it won't get the file extension
Log file contamination
Exploit the User-Agent Field:
First create a shell like the PentestMonkey one
Create a python server
Load the petition (like log file contamination petition) and capture it with BurpSuite
Modify the User-Agent field with this command:
Then access to
http://IP/shell.phpand you got the reverse shell
When we can echo commands try and it's using a regex like: /[#!@%^&*()$_=\[\]\';,{}:>?~\\\\]/ try:
Last updated