OS Command Injection attacks occur when the hacker attempts to execute system level commands through a vulnerable web application. These high impact server/application injections help the hacker to bypass administrator privileges and execute malicious OS commands. Just like SQL injections, OS Command injections can be blind or error-based.
Meta-characters (&, |, /;) are usually used to merge commands and create malicious OS Command Injections, that can be used to exploit vulnerable applications.
Read More