Path: blob/dev/integration_tests/fuzz/fuzz-body-generic-sqli.yaml
2070 views
id: fuzz-body-generic12info:3name: fuzzing error sqli payloads in http req body4author: pdteam5severity: info6description: |7This template attempts to find SQL injection vulnerabilities by fuzzing http body8It automatically handles and parses json,xml,multipart form and x-www-form-urlencoded data9and performs fuzzing on the value of every key1011http:12- pre-condition:13- type: dsl14dsl:15- method != "GET"16- method != "HEAD"17- contains(path, "/user") # for scope of integration test18condition: and1920payloads:21injection:22- "'"23- "\""24- ";"2526fuzzing:27- part: body28type: postfix29mode: single30fuzz:31- '{{injection}}'3233stop-at-first-match: true34matchers:35- type: word36words:37- "unrecognized token:"38- "null"394041