HTTP Parameter Pollution
Check List
Methodology
Black Box
1
2
GET /usernameSearch?name=jack&returningPath=/main3
GET /usernames/search?name=jack#foo&publicProfile=true4
Bypassing Authentication
1
2
POST /login
username=admin&password=wrongpassword3
POST /login
username=admin&password=wrongpassword&password=correctpassword4
Manipulating SQL Queries (Overwriting id)
1
2
GET /profile?id=13
GET /profile?id=1&id=2Tampering with API Calls (API key parameter)
1
2
3
GET /api/data?user=123&apikey=invalid-key&apikey=valid-key4
Altering Price Calculations (E-commerce)
1
2
3
4
Bypassing Input Validation and WAF (XSS evasion)
1
2
3
HTTP Parameter Pollution (Privilege Escalation)
1
2
3
4
Broken Access Control
1
2
3
4
5
JSON Parameter Pollution In Export Proccess
1
2
3
4
5
JSON Parameter Pollution Authentication bypass
1
2
3
4
Test Case in Login Parameter
1
2
3
4
5
White Box
Cheat Sheet
Last updated