Files
nuclei-templates/http/vulnerabilities/phpmyadmin-unauth.yaml
2024-09-12 05:14:02 +00:00

63 lines
1.5 KiB
YAML

id: phpmyadmin-unauth-access
info:
name: PhpMyAdmin - Unauthenticated Access
author: pwnhxl
severity: high
description: Unauthenticated Access to phpmyadmin dashboard.
reference:
- https://www.phpmyadmin.net
classification:
cpe: cpe:2.3:a:phpmyadmin:phpmyadmin:*:*:*:*:*:*:*:*
metadata:
verified: true
max-request: 6
vendor: phpmyadmin
product: phpmyadmin
shodan-query: html:"server_databases.php"
fofa-query: body="server_databases.php"
tags: misconfig,phpmyadmin,unauth
http:
- raw:
- |
GET {{path}} HTTP/1.1
Host: {{Hostname}}
payloads:
path:
- "/index.php"
- "/pma/index.php"
- "/pmd/index.php"
- "/phpMyAdmin/index.php"
- "/phpmyadmin/index.php"
- "/_phpmyadmin/index.php"
attack: batteringram
stop-at-first-match: true
matchers-condition: and
matchers:
- type: word
part: body
words:
- 'server_sql.php'
- 'server_status.php'
- 'server_variables.php'
- 'server_databases.php'
condition: and
- type: word
part: header
words:
- 'Set-Cookie: phpMyAdmin='
- type: word
part: header
words:
- 'text/html'
- type: status
status:
- 200
# digest: 490a0046304402206186a5844d1a9a5ac3c711df15fac1605415a89a80626d291ffed947715995bf02204a6681d1566934d806be41c7a50e361c59f0bfc09583d946198b7997edeac769:922c64590222798bb761d5b6d8e72950