Files
nuclei-templates/http/exposures/backups/sql-server-dump.yaml

61 lines
1.5 KiB
YAML
Raw Normal View History

2024-07-02 15:25:15 +05:30
id: sql-server-dump
2024-05-11 13:48:32 +03:30
info:
name: SQL Server - Dump Files
author: userdehghani
severity: medium
description: |
A SQL Server dump file was found
classification:
cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
cvss-score: 5.3
cwe-id: CWE-200
metadata:
max-request: 21
tags: exposure,backup,sql-server
2024-05-11 13:48:32 +03:30
http:
- method: GET
path:
- "{{BaseURL}}{{paths}}"
2024-07-01 15:46:18 +05:30
2024-05-11 13:48:32 +03:30
payloads:
paths:
- "/sa.bak"
- "/wwwroot.bak"
- "/backup.bak"
- "/database.bak"
- "/data.bak"
- "/db_backup.bak"
- "/dbdump.bak"
- "/db.bak"
- "/dump.bak"
- "/{{Hostname}}.bak"
- "/{{Hostname}}_db.bak"
- "/localhost.bak"
- "/mysqldump.bak"
- "/mysql.bak"
- "/site.bak"
- "/sql.bak"
- "/temp.bak"
- "/translate.bak"
- "/users.bak"
- "/www.bak"
- "/wp-content/uploads/dump.bak"
- "/wp-content/mysql.bak"
headers:
Range: "bytes=0-500"
max-size: 500 # Size in bytes - Max Size to read from server response
matchers-condition: and
matchers:
- type: binary
2024-07-02 15:25:15 +05:30
part: body
2024-05-11 13:55:21 +03:30
binary:
2024-05-11 13:48:32 +03:30
- "54415045" # Microsoft Tape Format
- type: status
status:
2024-09-04 15:35:24 +00:00
- 200
2025-06-12 12:10:06 +00:00
# digest: 4a0a0047304502210083bc4c748a11c71f493cbce9bf3f94e93bbb942ddad205ab6dea98cf0eb3e27e02206e2edc1d99d35554d37e5b743766562ba382fa54603be305453a2502bb0412ed:922c64590222798bb761d5b6d8e72950