Files
nuclei-templates/http/vulnerabilities/generic/oob-param-based-interaction.yaml
2025-10-26 16:17:37 +00:00

25 lines
1.2 KiB
YAML

id: oob-param-based-interaction
info:
name: Parameter Based Generic OOB Interaction
author: pdteam
severity: info
description: The remote server fetched a spoofed URL from the request parameters.
reference:
- https://github.com/PortSwigger/collaborator-everywhere
metadata:
max-request: 1
tags: oast,ssrf,generic,vuln
http:
- method: GET
path:
- "{{BaseURL}}/?u=http://{{interactsh-url}}/&href=http://{{interactsh-url}}/&action=http://{{interactsh-url}}/&host={{interactsh-url}}&http_host={{interactsh-url}}&email=root@{{interactsh-url}}&url=http://{{interactsh-url}}/&load=http://{{interactsh-url}}/&preview=http://{{interactsh-url}}/&target=http://{{interactsh-url}}/&proxy=http://{{interactsh-url}}/&from=http://{{interactsh-url}}/&src=http://{{interactsh-url}}/&ref=http://{{interactsh-url}}/&referrer=http://{{interactsh-url}}/"
matchers:
- type: word
part: interactsh_protocol
name: http
words:
- "http"
# digest: 4a0a00473045022100fe917c335287ede74804ab67ecc2ff3da28bb77511fcc25e8ceb660d9b9b11750220276ecaf634b3f6b4e1dc3849b3f575daa0feb50ebe3724378909378893e5ac69:922c64590222798bb761d5b6d8e72950