id: mdb-database-file info: name: Microsoft Access Database File - Detect author: pdteam severity: medium description: Microsoft Access database file was detected. reference: - https://owasp.org/www-project-web-security-testing-guide/v42/4-Web_Application_Security_Testing/07-Input_Validation_Testing/05.5-Testing_for_MS_Access.html classification: cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N cvss-score: 5.3 cwe-id: CWE-200 metadata: max-request: 341 tags: fuzz,mdb,asp,fuzzing http: - raw: - | GET {{mdbPaths}} HTTP/1.1 Host: {{Hostname}} Origin: {{BaseURL}} Accept-Language: en-US,en;q=0.9 payloads: mdbPaths: helpers/wordlists/mdb-paths.txt threads: 50 max-size: 500 # Size in bytes - Max Size to read from server response stop-at-first-match: true matchers-condition: and matchers: - type: binary binary: - "000100005374616E64617264204A657420444200" # mdb part: body - type: word words: - "application/x-msaccess" part: header - type: status status: - 200 # digest: 4b0a00483046022100e8fe7fe6dcea1e379c789a2a4fe8b55117d3d789e05b52283c82ad4b42ccc5020221008d3a07b797c719defe89c32f9eb37a9dcf9872b93d7e984a9af0f9f513964bdd:922c64590222798bb761d5b6d8e72950