API parameter pollution
What is API Parameter Pollution?
Vulnerable Scenario Example
POST /api/transfer HTTP/1.1
Content-Type: application/x-www-form-urlencoded
amount=100&to_account=user123&from_account=adminPOST /api/transfer HTTP/1.1
Content-Type: application/x-www-form-urlencoded
amount=100&to_account=user123&amount=999999&to_account=attacker&from_account=adminParameter Processing Differences
Technology-Specific Handling
API Parameter Pollution Attack Techniques
Authentication and Authorization Bypass
Business Logic Manipulation
Input Validation Bypass
Testing Methodology
Manual Parameter Pollution Testing
Burp Suite Automated Testing
Advanced Parameter Pollution Techniques
Content-Type Confusion
Framework-Specific Exploits
Logic Bomb Parameter Pollution
Business Logic Attack Scenarios
Financial Transaction Manipulation
Access Control Bypass
Detection and Analysis
Response Analysis Patterns
Timing Analysis
Testing Checklist
Parameter Pollution Test Cases
Last updated
Was this helpful?