Path: blob/dev/integration_tests/protocols/http/raw-unsafe-path.yaml
2070 views
id: raw-unsafe-path12info:3name: Test RAW Unsafe Paths4author: pd-team5severity: info6description: >7- https://github.com/projectdiscovery/nuclei/pull/32118- https://github.com/projectdiscovery/nuclei/pull/31279reference:10# adding expected results here for context and debugging11- "1337"12- "1337?with=param"13- "/some%0A/%0D"14- "/%20test%0a"15- "/text4shell/attack?search=$%7bscript:javascript:java.lang.Runtime.getRuntime().exec('nslookup%20{}.getparam')%7d"16- "/test/..;/..;/"17- "/xyz/%u2s/%invalid"18- "//CFIDE/wizards/common/utils.cfc"192021# Test all unsafe URL Handling Edgecases22http:23- raw:24# relative path without leading slash25- |+26GET 1337 HTTP/1.127Host: scanme.sh28# same but with param29- |+30GET 1337?with=param HTTP/1.131Host: scanme.sh32# url encoded characters in path33- |+34GET /some%0A/%0D HTTP/1.135Host: scanme.sh36# test unsupported chars in path37- |+38GET /%20test%0a HTTP/1.139Host: scanme.sh40# test payload integrity params41- |+42GET /text4shell/attack?search=$%7bscript:javascript:java.lang.Runtime.getRuntime().exec('nslookup%20{}.getparam')%7d HTTP/1.143Host: scanme.sh44# test for missing trailing slash45- |+46GET /test/..;/..;/ HTTP/1.147Host: scanme.sh48Origin: {{BaseURL}}49# test relative path with invalid/corrupted characters50- |+51GET /xyz/%u2s/%invalid HTTP/1.152Host: scanme.sh53# test relative path start with // (should not be removed)54- |+55GET //CFIDE/wizards/common/utils.cfc HTTP/1.156Host: scanme.sh5758unsafe: true59matchers:60- type: status61status:62- 200636465