Files
nuclei-templates/misconfiguration/phpmyadmin-sql.php-server.yaml
2021-06-23 21:34:13 +05:30

22 lines
526 B
YAML

id: phpmyadmin misconfiguration
info:
name: Sensitive data exposure
author: pussycat0x
severity: High
description: Unauthenticated phpmyadmin leads expose sensitive information
reference: https://www.exploit-db.com/ghdb/6997
tags: phpmyadmin,misconfiguration,
requests:
- method: GET
path:
- "{{BaseURL}}/phpmyadmin/sql.php?server=1"
redirects: true
matchers:
- type: word
words:
- "Database"
- type: status
status:
- 200