we can see that the application is sharing with us the json data format as below
copying json data to a file & uploading that file to the application to see how the app is handling the request
the app is redirecting us to the product page, and if we follow the redirection we can see that the app is printing the json data that we uploaded
Triggering the Vulnerability :
I tried first to inject the following payload which just execute remote command "ls" to see if the application would print the output of the command in the table
but got an error message
However, it might be that the app executed our command successfully but it's not processing the output correctly, or we are in a blind injection situation, so I tried another method to check for blind Injection , one example can be using ping command, and ask the app to ping our host by forwarding this payload :
and capturing icmp packets on our host using this command
and after we uploading the ping payload we can see that the app is successfully executed our command!
Reverse Shell - BASH TCP :
hosting the following shell.sh using python SimpleHTTPServer
passing the following payload to the app ( the payload just curl the shell.sh file, to check that the application can fetch the file correctly )
and we can see that the app fetched our file
now passing this payload to first fetch the file (curl) & execute it (by piping it to bash)