Exploitation

The http://192.168.135.58/image.php?img= parameter is vulnerable to Remote File Inclusion, which allows an attacker to make the website request a file that it is not in the local webserver. This means that the attacker is able to generate a reverse php shell, and get Remote Code Execution.

As we can see the applicaiton requested the said file once we specified it in the url.

Last updated