How this template works
The API selection filters in this template specify the desired response code range. In this case, it filters for response codes that are greater than or equal to 200 and less than 300, indicating a successful response.
The execute section of the template defines a single request to be executed. It uses the "add_query_param" action to add query parameters to the request. Each query parameter is given a name (e.g., "cmd", "exec", "command") and a corresponding value (e.g., "echo 'hello world'"). This simulates a potential command injection by adding query parameters that resemble common command execution keywords.
The validation section specifies the expected response payload. In this case, it checks if the response contains the string "hello world'. If the response payload contains this string, the validation is considered successful, indicating that the command injection vulnerability may be present.
Frequently asked questions
What is the purpose of the "Command injection by adding query parameters" test
What are the potential impacts of a successful command injection exploit
What category and subcategory does this test fall under
What are the severity and tags associated with this test
What are the query parameters used in the test
What is the validation criteria for this test