Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

SQL injection is not detected in single-page applications (SPAs) or during form submissions using JavaScript. #623

Open
Kundan8000 opened this issue Oct 25, 2024 · 0 comments

Comments

@Kundan8000
Copy link

Kundan8000 commented Oct 25, 2024

Issue:

When testing the site demoblaze.com, SQL injection vulnerabilities are not detected because the form uses JavaScript for submission without specifying action or name attributes.

Proposed Solution:

Using Selenium, we can identify all forms on the page, submit them with dummy data, and capture the actual payload sent over the network. For intercepting these network requests, we can use selenium-wire to observe and analyze the payloads generated during form submission. Once captured, we can modify this payload with custom inputs to perform SQL injection tests.

Library Version: Wapiti 3.2.0
OS Version: Ubuntu 22.04.4 LTS

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

1 participant