Code Execution 07

Bookmarked!

This exercise is one of our challenges on Code Execution

PRO Medium < 1 Hr. 12053 Essential Badge
Course

In this lab, we explore how to execute code within a vulnerable Flask application using the <code>__import__('os').system(...)</code> syntax to bypass the absence of a direct <code>os</code> module import. By replacing the initial call to <code>id</code> with the <code>score</code> command, users can successfully complete the exercise.

Skills covered
Injection Operating System
CWE-20, CWE-95
Included with PRO
Full course content 2 videos Common mistakes

Ready to practice?

Get access to this lab and 600+ hands-on exercises with a PRO subscription.