How this template works
APIs Selection
The API selection filters in this template specify the desired response code range. In this case, it filters for response codes that are greater than or equal to 200 and less than 300, indicating a successful response.
Execute request
The execute section of the template defines a single request to be executed. It uses the "add_query_param" action to add query parameters to the request. Each query parameter is given a name (e.g., "cmd", "exec", "command") and a corresponding value (e.g., "echo 'hello world'"). This simulates a potential command injection by adding query parameters that resemble common command execution keywords.
Validation
The validation section specifies the expected response payload. In this case, it checks if the response contains the string "hello world'. If the response payload contains this string, the validation is considered successful, indicating that the command injection vulnerability may be present.