.. / awk
Star

Awk injection is no different than other command injection vulnerabilities, including SQL injection. Awk is an incredibly powerful (yet simple) tool, so the possibilities are endless. See this report for an example.

Shell

It can be used to break out from restricted environments by spawning an interactive system shell.

Command

It can be used to break out from the intended program by running non-interactive system commands.

File write

It writes data to files, it may be used to do privileged writes or write files outside a restricted file system.

File read

It reads data from files, it may be used to do privileged reads or disclose files outside a restricted file system.