Skip to content

Latest commit

 

History

History
18 lines (10 loc) · 619 Bytes

README.md

File metadata and controls

18 lines (10 loc) · 619 Bytes

ScanReflectedSSTI

This script allows to find SSTI vulnerabilities with nuclei, taking advantage of this resource in its maximum analysis capacity.

In the community I have not seen SSTI Fuzzing with nuclei in general, only focused on exploitations by CVE

Testing Fuzzing GET

In the first instance they must collect the urls with the GET parameters.

cat url.txt | nuclei -t ScanSSTI.yaml
nuclei -u 'http://192.168.100.61/xvwa/vulnerabilities/ssti/?name=&submit=' -t ScanSSTI.yaml 

image