I am performing a security scan using owasp, which detects a slq injection vulnerability. When I run it from my Firefox browser monitored with owasp from the HUD and selecting the replay in Borwser option, it redirects me to a page like this
https://myweb.app/login.php?zapHudReplaceReq=4eca1e78-2bcf-4621-a471
where I can see the session cookie. The problem is that when I try to run in my browser without owasp's HUD to recreate the attack, the injection doesn't work, it doesn't show me any sql error or anything. I hope someone can help me please. The request method is POST through the parameter
pass = myvalidpassword% 27 + AND +% 271% 27% 3D% 271% 27 + - +
so i try to do sql injection but it doesn't work, and i don't know why. Does any boby have an idea? somebody kwnos how works the zapHudReplaceReq If you need more information coment in the post.