Web application security - the fast guide 1.1 | Page 140

Chapter 7 - Attack execution (3) P a g e | 140 But if an attacker wanted to exploit this functionality in malicious way he can simply use shell special characters like (|) to make that code show the password file. Using the pipe character will pass the output of the functionality to the command after the pipe but what if the command after the pipe character was cat/etc/passwd this eventually will cause the command to ignore the output of the executed functionality and execute the cat command which will show the contents of passwd file