Bypassing Security Filters

To get the flag, try to bypass the command injection filter through HTTP Verb Tampering, while using the following filename: file; cp /flag.txt ./

Step 1 - Access the application:

Step 2 - Try to add a file in the input field:

  • If we try to insert a file with the naming test; we got blocked by the application

Step 3 - Change to POST method:

  • The application is using a GET method to insert the file, change is to POST:

  • And the file is successully uploaded:

Step 3 - Get the flag:

  • Now that we can bypass the command injection, lets insert the filename file; cp /flag.txt ./

  • Click on flag.txt

And we are done!

Last updated