-
Notifications
You must be signed in to change notification settings - Fork 424
Parameter
ron190 edited this page Jan 28, 2025
·
1 revision
Several URL components can be exposed to injection vulnerabilities though input param like the query string is a common 🎯target.
Any target param can be identified easily and manually depending on your security knowledge, however 💉jSQL
can also find the vulnerability automatically.
http://localhost:8080/path/🎯/suffix
http://localhost:8080/path/endpoint?target=🎯¶m=value
POST http://localhost:8080/path/endpoint
body> target=🎯¶m=value
http://localhost:8080/path/endpoint
headers> Target: 🎯
Param: value
http://localhost:8080/path/endpoint
headers> Cookie: target=🎯; param=value
http://localhost:8080/path/endpoint
body> {
"target": "🎯",
"param": "value"
}
http://localhost:8080/path/endpoint
body> <soapenv:Envelope>
<soapenv:Header/>
<soapenv:Body>
<gs:method>
<gs:target>🎯</gs:target>
<gs:param>value</gs:param>
</gs:method>
</soapenv:Body>
</soapenv:Envelope>
Previous topic: SQL Engine, Next topic: Preference