Suspicious Parameters
At DEFCON 31, JHaddix and Gunnar presented a talk titled SusParams which uncovered research on parameters which are often vulnerable to common vulnerabilities such as SQLi, SSRF, LFI, etc. This page simply breaks down the parameters observed for reference.
Cross Site Scripting
path
admin
class
atb
redirect_uri
other
utm_source
host
currency
dir
title
endpoint
return_url
users
cookie
state
callback
militarybranch
href
e
referer
password
author
body
status
utm_campaign
value
text
search
x-forwarded-host
a
flaw
vote
pathname
user
t
utm_medium
q
onclick
email
what
file
onignoretag
__proto__
data-original
description
subject
action
u
nickname
color
language_id
auth
samlresponse
return
onmouseover
readyfunction
where
tags
cvo_sid
target
format
back
term
r
id
url
view
username
sequel
type
city
src
p
label
ctx
style
html
ad_type
onerror
s
issues
query
c
shop
redirectServer-Side Template Injection
Server-Side Request Forgery
SQL Injection
Open Redirect
IDOR
File Inclusion
Debug
Command Injection
Resources
Last updated