Skip to content

Commit c378188

Browse files
author
İsmail Taşdelen
authored
Merge pull request #3 from payloadbox/ismailtasdelen-patch-2
add statistics badged README.md
2 parents d104d80 + eec5695 commit c378188

File tree

1 file changed

+4
-0
lines changed

1 file changed

+4
-0
lines changed

README.md

+4
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,9 @@
11
## Command Injection Payload List
22

3+
<p align="center">
4+
<img src="https://cdn.rawgit.com/sindresorhus/awesome/d7305f38d29fed78fa85652e3a63e154dd8e8829/media/badge.svg"> <img src="https://img.shields.io/github/stars/payloadbox/command-injection-payload-list?style=social"> <img src="https://img.shields.io/github/forks/payloadbox/command-injection-payload-list?style=social"> <img src="https://img.shields.io/github/repo-size/payloadbox/command-injection-payload-list"> <img src="https://img.shields.io/github/license/payloadbox/command-injection-payload-list"> <img src="https://img.shields.io/github/issues/detail/author/payloadbox/command-injection-payload-list/1">
5+
</p>
6+
37
Command injection is an attack in which the goal is execution of arbitrary commands on the host operating system via a vulnerable application. Command injection attacks are possible when an application passes unsafe user supplied data (forms, cookies, HTTP headers etc.) to a system shell. In this attack, the attacker-supplied operating system commands are usually executed with the privileges of the vulnerable application. Command injection attacks are possible largely due to insufficient input validation.
48

59
This attack differs from Code Injection, in that code injection allows the attacker to add his own code that is then executed by the application. In Command Injection, the attacker extends the default functionality of the application, which execute system commands, without the necessity of injecting code.

0 commit comments

Comments
 (0)