Files
nuclei-templates/http/vulnerabilities/phpmyadmin-unauth.yaml

63 lines
1.5 KiB
YAML
Raw Normal View History

2023-03-14 12:26:32 +05:30
id: phpmyadmin-unauth-access
2023-03-13 20:16:19 +08:00
info:
2023-03-14 12:26:32 +05:30
name: PhpMyAdmin - Unauthenticated Access
2023-03-13 20:16:19 +08:00
author: pwnhxl
severity: high
2023-03-14 12:26:32 +05:30
description: Unauthenticated Access to phpmyadmin dashboard.
2023-03-13 20:16:19 +08:00
reference:
- https://www.phpmyadmin.net
2024-09-10 14:38:16 +05:30
classification:
cpe: cpe:2.3:a:phpmyadmin:phpmyadmin:*:*:*:*:*:*:*:*
2023-03-13 20:16:19 +08:00
metadata:
2023-06-04 13:43:42 +05:30
verified: true
2023-10-14 16:57:55 +05:30
max-request: 6
2024-09-10 14:38:16 +05:30
vendor: phpmyadmin
product: phpmyadmin
shodan-query: html:"server_databases.php"
fofa-query: body="server_databases.php"
2023-03-14 12:26:32 +05:30
tags: misconfig,phpmyadmin,unauth
2023-03-13 20:16:19 +08:00
http:
2023-03-13 20:16:19 +08:00
- raw:
- |
GET {{path}} HTTP/1.1
Host: {{Hostname}}
payloads:
path:
- "/index.php"
- "/pma/index.php"
- "/pmd/index.php"
- "/phpMyAdmin/index.php"
- "/phpmyadmin/index.php"
- "/_phpmyadmin/index.php"
2023-10-14 16:57:55 +05:30
attack: batteringram
2023-03-13 20:16:19 +08:00
stop-at-first-match: true
2023-10-14 16:57:55 +05:30
2023-03-13 20:16:19 +08:00
matchers-condition: and
matchers:
- type: word
part: body
words:
- 'server_sql.php'
- 'server_status.php'
- 'server_variables.php'
- 'server_databases.php'
condition: and
- type: word
part: header
words:
- 'Set-Cookie: phpMyAdmin='
- type: word
part: header
words:
- 'text/html'
- type: status
status:
- 200
2024-12-01 13:57:55 +00:00
# digest: 490a0046304402203c4fd73e516e942383e33b1c14d2c41643cbd9d340eaa90fd79bd7fba7fa63c1022074a521a1801040fbc01a8c90ca450777860817061d1899b13b2b8b08efc88a70:922c64590222798bb761d5b6d8e72950