Path: blob/dev/integration_tests/fuzz/fuzz-body.yaml
2844 views
id: fuzz-body12info:3name: fuzzing error sqli payloads in http req body4author: pdteam5severity: info6description: |7This template attempts to find SQL injection vulnerabilities by fuzzing http body8It automatically handles and parses json,xml,multipart form and x-www-form-urlencoded data9and performs fuzzing on the value of every key1011http:12- pre-condition:13- type: dsl14dsl:15- method != "GET"16- method != "HEAD"17condition: and1819payloads:20injection:21- "'"22- "\""23- ";"2425fuzzing:26- part: body27type: postfix28mode: single29fuzz:30- '{{injection}}'3132stop-at-first-match: true33matchers:34- type: word35words:36- "unrecognized token:"37- "null"383940