-
-
Notifications
You must be signed in to change notification settings - Fork 6.1k
Closed
Description
Hello,
I found that sqlmap missed an sql injection in the following structure of parameters:
https://xxx/api/get?cat_id=["string"]
I have specified a payload location manually using asterisk as below:
https://xxx/api/get?cat_id=["string*"]
and sqlmap managed to found and exploit the vulnerability.
The application is written on PHP, I'm not sure what's a framework behind it or how the the app parses this parameter.
Perhaps, you will know better. I suspect it has something to do with nested insertions?
Hope you can enhance the tool so it would parse such parameter and pick up the vulnerability automatically.
Thank you.