Update index.rst (#97)
This commit is contained in:
committed by
pancho horrillo
parent
2e1455cb61
commit
b0c8b74e63
@@ -381,14 +381,14 @@ In this example, an attacker can inject arbitrary parameters to ``ls``.
|
|||||||
ls $(kapow get /request/matches/value) | kapow set /response/body
|
ls $(kapow get /request/matches/value) | kapow set /response/body
|
||||||
EOF
|
EOF
|
||||||
|
|
||||||
Exploding using curl:
|
Exploiting using curl:
|
||||||
|
|
||||||
.. code-block:: console
|
.. code-block:: console
|
||||||
:linenos:
|
:linenos:
|
||||||
|
|
||||||
$ curl "http://localhost:8080/vulnerable/-li%20hello"
|
$ curl "http://localhost:8080/vulnerable/-li%20hello"
|
||||||
|
|
||||||
**This examples is NOT VULNERABLE to parameter injection**
|
**This example is NOT VULNERABLE to parameter injection**
|
||||||
|
|
||||||
Be aware of how we add double quotes when we recover *value* data from the
|
Be aware of how we add double quotes when we recover *value* data from the
|
||||||
request:
|
request:
|
||||||
|
|||||||
Reference in New Issue
Block a user