Path: blob/dev/integration_tests/fuzz/fuzz-path-sqli.yaml
2070 views
id: path-based-sqli12info:3name: Path Based SQLi4author: pdteam5severity: info6description: |7This template attempts to find SQL injection vulnerabilities on path based sqli and replacing numerical values with fuzzing payloads.8ex: /admin/user/55/profile , /user/15/action/update, /posts/15, /blog/100/data, /page/51/ etc these types of paths are filtered and9replaced with sqli path payloads.10Note: this is example template, and payloads/matchers need to be modified appropriately.1112http:13- pre-condition:14- type: dsl15dsl:16- 'method == "GET"'17condition: and1819payloads:20pathsqli:21- '%20OR%20True'2223fuzzing:24- part: path25type: postfix26mode: single27fuzz:28- '{{pathsqli}}'2930matchers:31- type: status32status:33- 2003435- type: word36words:37- "admin"38matchers-condition: and3940