ZAP scanner found Remote OS command injection.
Is there any foolproof way to check if this works and is not a false positive?
I have tried to make it sleep 50 seconds but it's not something I can visually see, also the page does not seem to take longer to load.
This is the URL the scanner found vulnerable:
http://*SECRET*/*SECRET*?from&to
This is the exploit:
Attack: ACG"&sleep 5s&"
So I assume I should write the URL like this to exploit it:
http://*SECRET*/*SECRET*?from=ACG&sleep 5s&to=AMR
The above does not appear to make page take longer to load. Either I made a typo, or perhaps it is not vulnerable as the URL gets sanitized to:
ACG&sleep%205s&to=AMR