Check vulnerability for sequences stripped with superfluous URL-decode
GET {{base_url}}
This request checks if the APIs allows an attacker to access file present in the server by passing the file path having various non-standard encodings, such as ..%c0%af or ..%252f to bypass the input filter.
HEADERS
| Key | Datatype | Required | Description |
|---|---|---|---|
{{access_token_key}} | string |