Files
nuclei-templates/http/vulnerabilities/generic/oob-param-based-interaction.yaml
2024-12-01 13:57:55 +00:00

25 lines
1.1 KiB
YAML

id: oob-param-based-interaction
info:
name: Parameter Based Generic OOB Interaction
author: pdteam
severity: info
description: The remote server fetched a spoofed URL from the request parameters.
reference:
- https://github.com/PortSwigger/collaborator-everywhere
metadata:
max-request: 1
tags: oast,ssrf,generic
http:
- method: GET
path:
- "{{BaseURL}}/?u=http://{{interactsh-url}}/&href=http://{{interactsh-url}}/&action=http://{{interactsh-url}}/&host={{interactsh-url}}&http_host={{interactsh-url}}&email=root@{{interactsh-url}}&url=http://{{interactsh-url}}/&load=http://{{interactsh-url}}/&preview=http://{{interactsh-url}}/&target=http://{{interactsh-url}}/&proxy=http://{{interactsh-url}}/&from=http://{{interactsh-url}}/&src=http://{{interactsh-url}}/&ref=http://{{interactsh-url}}/&referrer=http://{{interactsh-url}}/"
matchers:
- type: word
part: interactsh_protocol
name: http
words:
- "http"
# digest: 490a00463044022075a79146936cfa5c5f9a29d042ad96b8d503f9cfed95ad37bb732820fb0f68240220086341bd2ffb76824a10dbd8574cd6e8c6c00b8e4825b6a1d36464baa1e8a0de:922c64590222798bb761d5b6d8e72950