Skip to content

support of JSON objects in the HTTP parameters #1826

@blshkv

Description

@blshkv

Hello,

I found that sqlmap missed an sql injection in the following structure of parameters:
https://xxx/api/get?cat_id=["string"]

I have specified a payload location manually using asterisk as below:
https://xxx/api/get?cat_id=["string*"]
and sqlmap managed to found and exploit the vulnerability.

The application is written on PHP, I'm not sure what's a framework behind it or how the the app parses this parameter.

Perhaps, you will know better. I suspect it has something to do with nested insertions?
Hope you can enhance the tool so it would parse such parameter and pick up the vulnerability automatically.

Thank you.

Metadata

Metadata

Assignees

Type

No type

Projects

No projects

Milestone

Relationships

None yet

Development

No branches or pull requests

Issue actions