Update index.rst (#97)

This commit is contained in:
luissaiz
2019-11-29 11:56:14 +01:00
committed by pancho horrillo
parent 2e1455cb61
commit b0c8b74e63
+2 -2
View File
@@ -381,14 +381,14 @@ In this example, an attacker can inject arbitrary parameters to ``ls``.
ls $(kapow get /request/matches/value) | kapow set /response/body
EOF
Exploding using curl:
Exploiting using curl:
.. code-block:: console
:linenos:
$ curl "http://localhost:8080/vulnerable/-li%20hello"
**This examples is NOT VULNERABLE to parameter injection**
**This example is NOT VULNERABLE to parameter injection**
Be aware of how we add double quotes when we recover *value* data from the
request: