Skip to content

Sensitive Data: Seeyon OA A6 createMysql.jsp Database - Information Disclosure

Identifier: seeyon_createmysql_exposure

Scanner(s) Support

GraphQL Scanner REST Scanner WebApp Scanner

Description

Seeyon OA A6 has leaked sensitive database information. An attacker can obtain the database account and password MD5 by accessing a specific URL.

Reference:

Configuration

Example

Example configuration:

---
security_tests:
  seeyon_createmysql_exposure:
    assets_allowed:
    - REST
    - GRAPHQL
    - WEBAPP
    skip: false

Reference

assets_allowed

Type : List[AssetType]*

List of assets that this check will cover.

skip

Type : boolean

Skip the test if true.