POST https://postman-echo.com/post
This test checks if it is possible to inject malicious strings as a request parameter. If your server is not handling user input properly, these strings can be interpreted by your server as SQL commands that result in leaking sensitive information or general mayhem.
Body
PARAM
Key | Datatype | Required | Description |
HEADERS
Key | Datatype | Required | Description |
RESPONSES
status OK
{
"args": {},
"data": "",
"files": {},
"form": {
"customerName": "' or '1'='1"
},
"headers": {
"x-forwarded-proto": "https",
"host": "postman-echo.com",
"content-length": "38",
"accept": "*/*",
"accept-encoding": "gzip, deflate",
"cache-control": "no-cache",
"content-type": "application/x-www-form-urlencoded",
"cookie": "sails.sid=s%3A7tFj5KB_lujWMK1xoroPV_xSKkRDxR1W.qUauhME8lGY%2FnBlCT4iVRCs0badee7%2Fmen9XorL%2FJ4s",
"postman-token": "031152dc-59c7-4529-8f8a-29faf9f41afe",
"user-agent": "PostmanRuntime/7.3.0",
"x-forwarded-port": "443"
},
"json": {
"customerName": "' or '1'='1"
},
"url": "https://postman-echo.com/post"
} |