mirror of
https://github.com/projectdiscovery/nuclei.git
synced 2026-02-04 09:43:13 +08:00
* fuzz: rename 'filters' -> 'pre-condition'
* code proto: pre-condition + integration test
* feat: dsl document generator
* update dsl page header
* fix lint error
* add js defined helper funcs in docs
* remove panic recovery unless its for third party(go-rod,goja)
* handle dynamic values flattening edgecase in flow+multiprotocol
* fix order of kv in form-data (failing test)
* fix template loading counters
* Revert "handle dynamic values flattening edgecase in flow+multiprotocol"
This reverts commit 58fdd4faf7.
* fix flow iteration using 'iterate'
41 lines
1000 B
YAML
41 lines
1000 B
YAML
id: xml-body-error-sqli
|
|
|
|
info:
|
|
name: fuzzing error sqli payloads in xml body
|
|
author: pdteam
|
|
severity: info
|
|
description: |
|
|
This template attempts to find SQL injection vulnerabilities by fuzzing http body of xml type.
|
|
This is achieved by performing [ruleType](example: postfix) on value of xml key
|
|
Note: this is example template, and payloads/matchers need to be modified appropriately.
|
|
|
|
http:
|
|
- pre-condition:
|
|
- type: dsl
|
|
dsl:
|
|
- method != "GET"
|
|
- method != "HEAD"
|
|
- contains(content_type, "application/xml")
|
|
- contains(path, "/user") # for scope of integration test
|
|
condition: and
|
|
|
|
payloads:
|
|
injection:
|
|
- "'"
|
|
- "\""
|
|
- ";"
|
|
|
|
fuzzing:
|
|
- part: body
|
|
type: postfix
|
|
mode: single
|
|
fuzz:
|
|
- '{{injection}}'
|
|
|
|
stop-at-first-match: true
|
|
matchers:
|
|
- type: word
|
|
words:
|
|
- "unrecognized token:"
|
|
- "null"
|