cmdi_test
Test web applications for command injection vulnerabilities by sending payloads with common shell operators to detect insecure parameter processing.
Instructions
Test command injection using various shell operators. Tests ;, &&, ||, |, backtick, $(), and %0a (newline) operators with 'id' and 'whoami' as detection commands. Returns results array with operator, payload, status, output_snippet, likely_vulnerable. Side effects: Read-only detection commands (id, whoami). Sends ~14 requests.
Input Schema
| Name | Required | Description | Default |
|---|---|---|---|
| url | Yes | Target URL that processes the parameter server-side | |
| parameter | Yes | Vulnerable parameter name, e.g. 'storeId' | |
| base_value | No | Legitimate value for the parameter, e.g. '1' | |
| method | No | HTTP method | |
| operators | No | Injection operators to test. Default: all common operators. |