Path: blob/dev/integration_tests/fuzz/fuzz-body-multipart-form-sqli.yaml
2070 views
id: body-multipart-error-sqli12info:3name: fuzzing error sqli payloads in body of multipart form data4author: pdteam5severity: info6description: |7This template attempts to find SQL injection vulnerabilities by fuzzing http body of multipart form data (file upload, etc.)8This is achieved by performing [ruleType](example: postfix) on value of body form key9Note: this is example template, and payloads/matchers need to be modified appropriately.1011http:12- pre-condition:13- type: dsl14dsl:15- method != "GET"16- method != "HEAD"17- contains(content_type, "multipart/form-data")18- contains(path, "/user") # for scope of integration test19condition: and2021payloads:22injection:23- "'"24- "\""25- ";"2627fuzzing:28- part: body29type: postfix30mode: single31fuzz:32- '{{injection}}'3334stop-at-first-match: true35matchers:36- type: word37words:38- "unrecognized token:"39- "null"40- "SELECTs to the left and right of UNION do not have the same number of result columns"414243