-
Notifications
You must be signed in to change notification settings - Fork 110
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
appending with multiple payload is giving error #70
Comments
Why no one has replied to my issue. |
Hi. Could you provide some more information on the issue that you are having please? Is the issue that your BCheck is not passing validation, and you would like some further help in writing this BCheck? |
Hi We've looked into this in some more detail. We'd recommend using a "run for each" rather than providing multiple comma-separated values to "append". You will also need to use backticks for some of your variable declarations in the run for each loop. Please find an example below:
|
The B-check template you provided is not sending each payload it is sending one payload . I've checked my logger history and only 3 request are being sent. I want them to send all the payload that are in run for each variable. |
Hi. When only three requests are being sent, has an issue been found and reported? Once an issue has been reported, the BCheck will stop and not continue past this point. This can result in early termination of the BCheck, without it iterating through all of the "run for each" payloads. |
Ok I tested it further and found out this code behaving unexpectedly. If you see the code I clearly mentioned report only if weaponized response status code differs from base response status code . So If base response status is 200 , weaponized response status code should be 500 or any other status code than 200 then only it should report Sql Injection. But It still reports Sql Injection even if the code is weaponized status code is 200 which is same as base response status code. I looked it further and got to know that even if I provide the condition as weaponized.response.status.code it is reporting me instead of checking the status code its checking if response.status.code or response.body differs from the base response. I saw the Sql injection report in Target section and its reporting me based on difference on Content length but I clearly mentioned in the code only report if response.status.code is different from base.response.status.code.
|
Hi. We will be releasing a "BChecks" testing tool in the future, which should make it easier to debug issues like this. You can find this detailed in our roadmap here: https://portswigger.net/burp/pro/roadmap Are you able to drop us an email at [email protected] with some screenshots of this behavior? If you're able to, could you also share a sample site that has this behavior so that we can replicate this? |
Closing due to lack of reply |
metadata:
language: v1-beta
name: "SQL Injection "
description: "Classic SQL Injection"
author: "Carlos Montoya"
given query insertion point then
The text was updated successfully, but these errors were encountered: