id: default-sql-dump info: name: MySQL - Dump Files author: geeknik,dwisiswant0,ELSFA7110,mastercho severity: medium description: A MySQL dump file was found classification: cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N cvss-score: 5.3 cwe-id: CWE-200 metadata: max-request: 21 tags: exposure,backup,mysql http: - method: GET path: - "{{BaseURL}}/1.sql" - "{{BaseURL}}/backup.sql" - "{{BaseURL}}/database.sql" - "{{BaseURL}}/data.sql" - "{{BaseURL}}/db_backup.sql" - "{{BaseURL}}/dbdump.sql" - "{{BaseURL}}/db.sql" - "{{BaseURL}}/dump.sql" - "{{BaseURL}}/{{Hostname}}.sql" - "{{BaseURL}}/{{Hostname}}_db.sql" - "{{BaseURL}}/localhost.sql" - "{{BaseURL}}/mysqldump.sql" - "{{BaseURL}}/mysql.sql" - "{{BaseURL}}/site.sql" - "{{BaseURL}}/sql.sql" - "{{BaseURL}}/temp.sql" - "{{BaseURL}}/translate.sql" - "{{BaseURL}}/users.sql" - "{{BaseURL}}/www.sql" - "{{BaseURL}}/wp-content/uploads/dump.sql" - "{{BaseURL}}/wp-content/mysql.sql" headers: Range: "bytes=0-3000" max-size: 2000 # Size in bytes - Max Size to read from server response matchers-condition: and matchers: - type: regex regex: - "(?m)(?:DROP|CREATE|(?:UN)?LOCK) TABLE|INSERT INTO" part: body - type: status status: - 200 - 206 condition: or # digest: 4a0a00473045022100d35daf5192442aa02cdd047bca9ce33060efaf14802f17495a3fd0ee563dda920220747be0354c65c327c689868e5c14569dc4bf7381ed37f49e9f723220a4c8b1db:922c64590222798bb761d5b6d8e72950