id: default-sql-dump info: name: MySQL - Dump Files author: geeknik,dwisiswant0,ELSFA7110,mastercho severity: medium description: A MySQL dump file was found classification: cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N cvss-score: 5.3 cwe-id: CWE-200 metadata: max-request: 21 tags: exposure,backup,mysql http: - method: GET path: - "{{BaseURL}}{{paths}}" payloads: paths: - "/1.sql" - "/backup.sql" - "/database.sql" - "/data.sql" - "/db_backup.sql" - "/dbdump.sql" - "/db.sql" - "/dump.sql" - "/{{Hostname}}.sql" - "/{{Hostname}}_db.sql" - "/localhost.sql" - "/mysqldump.sql" - "/mysql.sql" - "/site.sql" - "/sql.sql" - "/temp.sql" - "/translate.sql" - "/users.sql" - "/www.sql" - "/wp-content/uploads/dump.sql" - "/wp-content/mysql.sql" headers: Range: "bytes=0-3000" max-size: 2000 # Size in bytes - Max Size to read from server response matchers-condition: and matchers: - type: regex regex: - "(?m)(?:DROP|CREATE|(?:UN)?LOCK) TABLE|INSERT INTO" part: body - type: status status: - 200 - 206 condition: or # digest: 490a00463044022016d685f84a873147704d9f80f703c04e58ea0289663816a3a42548469ad2721a022008a33f91d80f14fd5de3c353e4065a1a756d08118b5c421e769646d47075467f:922c64590222798bb761d5b6d8e72950