Skip to content

Commit 5b9ec7f

Browse files
authored
Update command-injection.md
1 parent 1ccf400 commit 5b9ec7f

File tree

1 file changed

+1
-8
lines changed

1 file changed

+1
-8
lines changed

src/pentesting-web/command-injection.md

Lines changed: 1 addition & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -189,13 +189,6 @@ topicurl=<handler>&param=-n
189189
topicurl=setEasyMeshAgentCfg&agentName=;id;
190190
```
191191

192-
Hardening and detection:
193-
194-
- Reject inputs that start with `-` and enforce strict allowlists and types (IP, MAC, SSID, etc.).
195-
- Always pass user data after a literal `--` where supported and never allow extra flags from user-controlled fields.
196-
- Prefer safe APIs (no shell); for wrappers, construct fixed argv templates with no user-controlled flags.
197-
- Look for unauthenticated hits to centralized CGI endpoints (e.g., `/cgi-bin/cstecgi.cgi`) with selector parameters and values beginning with `-`.
198-
199192
## Brute-Force Detection List
200193

201194

@@ -213,4 +206,4 @@ https://github.com/carlospolop/Auto_Wordlists/blob/main/wordlists/command_inject
213206
- [HTB Nocturnal: IDOR → Command Injection → Root via ISPConfig (CVE‑2023‑46818)](https://0xdf.gitlab.io/2025/08/16/htb-nocturnal.html)
214207
- [Unit 42 – TOTOLINK X6000R: Three New Vulnerabilities Uncovered](https://unit42.paloaltonetworks.com/totolink-x6000r-vulnerabilities/)
215208

216-
{{#include ../banners/hacktricks-training.md}}
209+
{{#include ../banners/hacktricks-training.md}}

0 commit comments

Comments
 (0)