Path: blob/dev/integration_tests/fuzz/fuzz-body-json-sqli.yaml
2070 views
id: json-body-error-sqli12info:3name: fuzzing error sqli payloads in json body4author: pdteam5severity: info6description: |7This template attempts to find SQL injection vulnerabilities by fuzzing http body of json type.8This is achieved by performing [ruleType](example: postfix) on value of json key9Note: this is example template, and payloads/matchers need to be modified appropriately.1011http:12- pre-condition:13- type: dsl14dsl:15- method != "GET"16- method != "HEAD"17- contains(content_type, "application/json")18- contains(path, "/user") # for scope of integration test19condition: and2021payloads:22injection:23- "'"24- "\""25- ";"2627fuzzing:28- part: body29type: postfix30mode: single31fuzz:32- '{{injection}}'3334stop-at-first-match: true35matchers:36- type: word37words:38- "unrecognized token:"39- "null"404142