Files
nuclei-templates/http/exposures/backups/mysql-dump.yaml
2025-07-21 10:50:27 +00:00

60 lines
1.5 KiB
YAML

id: mysql-dump
info:
name: MySQL - Dump Files
author: geeknik,dwisiswant0,ELSFA7110,mastercho
severity: medium
description: A MySQL dump file was found
classification:
cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
cvss-score: 5.3
cwe-id: CWE-200
metadata:
max-request: 21
tags: exposure,backup,mysql
http:
- method: GET
path:
- "{{BaseURL}}{{paths}}"
payloads:
paths:
- "/1.sql"
- "/backup.sql"
- "/database.sql"
- "/data.sql"
- "/db_backup.sql"
- "/dbdump.sql"
- "/db.sql"
- "/dump.sql"
- "/{{Hostname}}.sql"
- "/{{Hostname}}_db.sql"
- "/localhost.sql"
- "/mysqldump.sql"
- "/mysql.sql"
- "/site.sql"
- "/sql.sql"
- "/temp.sql"
- "/translate.sql"
- "/users.sql"
- "/www.sql"
- "/wp-content/uploads/dump.sql"
- "/wp-content/mysql.sql"
headers:
Range: "bytes=0-3000"
max-size: 2000 # Size in bytes - Max Size to read from server response
matchers-condition: and
matchers:
- type: regex
regex:
- "(?m)(?:DROP|CREATE|(?:UN)?LOCK) TABLE|INSERT INTO"
part: body
- type: status
status:
- 200
- 206
condition: or
# digest: 490a00463044022055fa32a05c375a6cce45c9859bb6ae03d0c3b0e757df0368fd6233124a12462c022004fa798b8a10daff2588ac3b308f9a22c2edf97212a7e10d6b2f6b2507c470ee:922c64590222798bb761d5b6d8e72950