You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
We want a test to check whether an attacker can create/update entity with File upload.
🎯 Requirements:
Filters - API with atleast one parameter as an input in GET query parameter or JSON body parameter accepting Files, having header for Files like “Content-Type” : “multipart/form-data” or “Content-type” : “application/octet-stream” or other types of headers used for File upload
Execute - It should replace the value with
Changing the content-type header and sending the same file as identified in the original request
Keeping the header and uploading some other file in Body
Not sending any file and keeping the header same
removing the header and then sending any file, or the same original file
Validation - If the application responds with a exception trace, it is a vulnerability.
✅ Task summary:
Ask to be assigned to the issue.
Wait to be assigned. We will try to assign in less than 2 hours.
Hey @arjun-akto, I have gone through the test-library repo and example YAML test and I feel I can contribute to this issue by writing the above mentioned test. Can you please assign this issue to me?
💭 Introduction:
We want a test to check whether an attacker can create/update entity with File upload.
🎯 Requirements:
Filters - API with atleast one parameter as an input in GET query parameter or JSON body parameter accepting Files, having header for Files like “Content-Type” : “multipart/form-data” or “Content-type” : “application/octet-stream” or other types of headers used for File upload
Execute - It should replace the value with
✅ Task summary:
📚 Reading
Find 100+ examples of YAML tests [here]
🙋🏼♂️ Questions:
If you have questions, need any help, or just want to hang out, make sure to join us on our [Discord server].
The text was updated successfully, but these errors were encountered: