Blind OS command injection with out-of-band interaction
Last updated
Was this helpful?
Last updated
Was this helpful?
The Submit Feedback page contains four input fields:
Name
Subject
Message
Our goal is to test whether these fields are vulnerable to command injection by leveraging out-of-band (OOB) interactions via DNS lookups to Burp Collaborator.
Using Burp Suite, intercept the HTTP request when submitting feedback. The intercepted request will contain parameters corresponding to the form inputs.
Objective: Modify one of these parameters to execute a payload that triggers a DNS lookup to Burp Collaborator.
In the Email field, inject the following payload:
This payload triggers a DNS lookup for the subdomain generated by Burp Collaborator, confirming that the server executes commands.
||
: Ends the existing shell command.
nslookup
: A command to perform DNS lookups.
x.BURP-COLLABORATOR-SUBDOMAIN
: Replaces x
with the generated subdomain for monitoring.
Submit the request with the modified payload.
The server responds with 200 OK, indicating the payload was executed.
Switch to the Burp Collaborator tab and click Poll now.
Observe DNS requests generated by the server to your subdomain.
When the server does not return command output or write it to an accessible location, OOB interaction is the best way to verify that a command was executed. DNS lookups leave a trace on external systems, enabling confirmation of blind vulnerabilities without requiring direct output.