From 019a193aec4202876830ffc6ed5aa78a196495c4 Mon Sep 17 00:00:00 2001 From: Geeknik Labs <466878+geeknik@users.noreply.github.com> Date: Wed, 17 Mar 2021 19:31:08 +0000 Subject: [PATCH] Update error-based-sql-injection.yaml --- vulnerabilities/generic/error-based-sql-injection.yaml | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/vulnerabilities/generic/error-based-sql-injection.yaml b/vulnerabilities/generic/error-based-sql-injection.yaml index 022ec89df7..1dcc4b1cd2 100644 --- a/vulnerabilities/generic/error-based-sql-injection.yaml +++ b/vulnerabilities/generic/error-based-sql-injection.yaml @@ -12,7 +12,7 @@ requests: path: - "{{BaseURL}}/') OR 1 = 1 -- ];" # Nuclei's use of net/http here will automatically encode the payload, thus sending {{BaseURL}}/%27%29%20OR%201%20=%201%20--%20%5D; as the request - # In order to send an unencoded payload, you'll have to make use of the rawhttp library by crafting a raw HTTP request + # In order to send an unencoded payload, you'll have to make use of the rawhttp library by crafting a raw HTTP request matchers-condition: and matchers: