Skip to content

Security Test: Exposed MySQL Config

Description

Default Severity:

When the MySQL configuration file is accidentally made public, anyone can view sensitive details like usernames, passwords, and connection info. This exposure can let attackers break into your database, steal data, or find other ways to compromise your system. It usually happens when developers leave these files with loose permissions or mistakenly keep them in public folders during setup or debugging. The risks include unauthorized access and potential data breaches, so it's crucial to properly secure these files to avoid giving attackers an easy entry point.

Configuration

Identifier: information_disclosure/exposed_mysql_config

Examples

All configuration available:

checks:
  information_disclosure/exposed_mysql_config:
    skip: false # default

Compliance and Standards

Standard Value
OWASP API Top 10 API8:2023
OWASP LLM Top 10 LLM06:2023
PCI DSS 2.2.2
GDPR Article-32
SOC2 CC6
PSD2 Article-95
ISO 27001 A.12.6
NIST SP800-123
FedRAMP AC-22
CWE 200
CVSS Vector AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
CVSS Score 3.0