nuclei-templates/http/vulnerabilities/phpmyadmin-unauth.yaml

65 lines
1.5 KiB
YAML
Raw Normal View History

2023-03-14 06:56:32 +00:00
id: phpmyadmin-unauth-access
2023-03-13 12:16:19 +00:00
info:
2023-03-14 06:56:32 +00:00
name: PhpMyAdmin - Unauthenticated Access
2023-03-13 12:16:19 +00:00
author: pwnhxl
severity: high
2023-03-14 06:56:32 +00:00
description: Unauthenticated Access to phpmyadmin dashboard.
2023-03-13 12:16:19 +00:00
reference:
- https://www.phpmyadmin.net
metadata:
2023-06-04 08:13:42 +00:00
verified: true
2023-10-14 11:27:55 +00:00
max-request: 6
2023-03-14 06:56:32 +00:00
shodan-query: html:"server_databases.php"
2023-03-13 12:16:19 +00:00
fofa-query: body="server_databases.php"
2024-09-10 08:22:50 +00:00
product: phpmyadmin
vendor: phpmyadmin
2023-03-14 06:56:32 +00:00
tags: misconfig,phpmyadmin,unauth
2023-03-13 12:16:19 +00:00
2024-09-10 08:22:50 +00:00
classification:
cpe: cpe:2.3:a:phpmyadmin:phpmyadmin:*:*:*:*:*:*:*:*
http:
2023-03-13 12:16:19 +00:00
- raw:
- |
GET {{path}} HTTP/1.1
Host: {{Hostname}}
payloads:
path:
- "/index.php"
- "/pma/index.php"
- "/pmd/index.php"
- "/phpMyAdmin/index.php"
- "/phpmyadmin/index.php"
- "/_phpmyadmin/index.php"
2023-10-14 11:27:55 +00:00
attack: batteringram
2023-03-13 12:16:19 +00:00
stop-at-first-match: true
2023-10-14 11:27:55 +00:00
2023-03-13 12:16:19 +00:00
matchers-condition: and
matchers:
- type: word
part: body
words:
- 'server_sql.php'
- 'server_status.php'
- 'server_variables.php'
- 'server_databases.php'
condition: and
- type: word
part: header
words:
- 'Set-Cookie: phpMyAdmin='
- type: word
part: header
words:
- 'text/html'
- type: status
status:
- 200
# digest: 4b0a00483046022100f148d3a4543cbbe95e69b1ab8831ec6307974affb8c6c94dc6a5dd5169a54f08022100f20348ed33d7e10c8c5fcbff2e1821a1b18e377eb0da77b40390923edc9e1bb9:922c64590222798bb761d5b6d8e72950