id: mdb-database-file info: name: Microsoft Access Database File - Detect author: pdteam severity: medium description: Microsoft Access database file was detected. reference: - https://owasp.org/www-project-web-security-testing-guide/v42/4-Web_Application_Security_Testing/07-Input_Validation_Testing/05.5-Testing_for_MS_Access.html classification: cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N cvss-score: 5.3 cwe-id: CWE-200 metadata: max-request: 341 tags: fuzz,mdb,asp,fuzzing http: - raw: - | GET {{mdbPaths}} HTTP/1.1 Host: {{Hostname}} Origin: {{BaseURL}} Accept-Language: en-US,en;q=0.9 payloads: mdbPaths: helpers/wordlists/mdb-paths.txt threads: 50 max-size: 500 # Size in bytes - Max Size to read from server response stop-at-first-match: true matchers-condition: and matchers: - type: binary binary: - "000100005374616E64617264204A657420444200" # mdb part: body - type: word words: - "application/x-msaccess" part: header - type: status status: - 200 # digest: 490a0046304402206b562150655fa9fa2276b77b4db3996c9817ba23af6c955e9c1d8bfdb0dcf09702201ea4b0f984a680eab465fd6d66e8f9d0c1d9ce874c522c223b2cfce0588b32a1:922c64590222798bb761d5b6d8e72950