Ethical Hacking Automation

Automate Recon and scanning process with Vidoc. All security teams in one place

phpmyadmin Data Exposure

By kannthu

Medium
Vidoc logoVidoc Module
#phpmyadmin#misconfig#edb
Description

What is the "phpmyadmin Data Exposure?"

The "phpmyadmin Data Exposure" module is designed to detect instances of misconfiguration in phpMyAdmin, a popular web-based database management tool. This module focuses on identifying unauthenticated instances of phpMyAdmin that could potentially expose sensitive information. The severity of this vulnerability is classified as medium.

This module was authored by pussycat0x.

Impact

If an unauthenticated instance of phpMyAdmin is discovered, it can be leveraged by attackers to gain unauthorized access to sensitive information stored in the database. This can lead to potential data breaches and compromise the confidentiality of the data.

How the module works?

The "phpmyadmin Data Exposure" module works by sending HTTP requests to specific paths associated with phpMyAdmin. It checks for the presence of certain patterns in the response body and verifies that the response status is 200 (OK).

For example, one of the HTTP requests sent by this module is:

GET /phpmyadmin/index.php?db=information_schema

The module then matches the response body against the following patterns:

- var db = 'information_schema'; - var opendb_url = 'db_structure.php';

If both the patterns are found in the response body and the response status is 200, the module considers the instance of phpMyAdmin as potentially misconfigured and vulnerable to data exposure.

It's important to note that this module only detects the presence of misconfiguration and does not perform any active exploitation or modification of the target system.

For more information, you can refer to the exploit-db.com website.

Module preview

Concurrent Requests (1)
1. HTTP Request template
GET/phpmyadmin/index.ph.../phpMyAdmin/index.ph...
Matching conditions
word: var db = 'information_schema';, var o...and
status: 200
Passive global matcher
No matching conditions.
On match action
Report vulnerability