sqli_where_bypass
Test SQL injection vulnerabilities by bypassing WHERE clauses with OR 1=1 payload variants. Compares response lengths to identify potential injection points in web applications.
Instructions
Test WHERE clause bypass via OR 1=1 variants. Sends multiple payloads (OR 1=1--, OR '1'='1, OR 1=1/*, etc.) against the target parameter and compares response lengths to the baseline. Returns baseline_length and results array. Side effects: None (read-only GET requests). Sends 7 requests total.
Input Schema
| Name | Required | Description | Default |
|---|---|---|---|
| url | Yes | Full URL with query parameter, e.g. https://target/filter?category=Gifts | |
| parameter | Yes | Vulnerable query parameter name, e.g. 'category' | |
| value | Yes | Legitimate parameter value to base the injection on, e.g. 'Gifts' |