Files
nuclei-templates/misconfiguration/phpmyadmin-sql.php-server.yaml
sandeep 134a23aeab Some fixes (WIP)
- Added missing matcher condition
- Updated severity to lowercase, as it's case sensitive
2021-06-24 01:03:41 +05:30

24 lines
529 B
YAML

id: phpmyadmin-misconfiguration
info:
name: Sensitive data exposure
author: pussycat0x
severity: high
description: Unauthenticated phpmyadmin leads expose sensitive information
reference: https://www.exploit-db.com/ghdb/6997
tags: phpmyadmin,misconfig
requests:
- method: GET
path:
- "{{BaseURL}}/phpmyadmin/sql.php?server=1"
matchers-condition: and
matchers:
- type: word
words:
- "Database"
- type: status
status:
- 200