Book a Demo!
CoCalc Logo Icon
StoreFeaturesDocsShareSupportNewsAboutPoliciesSign UpSign In
projectdiscovery
GitHub Repository: projectdiscovery/nuclei
Path: blob/dev/integration_tests/fuzz/fuzz-body-generic-sqli.yaml
2070 views
1
id: fuzz-body-generic
2
3
info:
4
name: fuzzing error sqli payloads in http req body
5
author: pdteam
6
severity: info
7
description: |
8
This template attempts to find SQL injection vulnerabilities by fuzzing http body
9
It automatically handles and parses json,xml,multipart form and x-www-form-urlencoded data
10
and performs fuzzing on the value of every key
11
12
http:
13
- pre-condition:
14
- type: dsl
15
dsl:
16
- method != "GET"
17
- method != "HEAD"
18
- contains(path, "/user") # for scope of integration test
19
condition: and
20
21
payloads:
22
injection:
23
- "'"
24
- "\""
25
- ";"
26
27
fuzzing:
28
- part: body
29
type: postfix
30
mode: single
31
fuzz:
32
- '{{injection}}'
33
34
stop-at-first-match: true
35
matchers:
36
- type: word
37
words:
38
- "unrecognized token:"
39
- "null"
40
41