Skip to content

Sensitive Data: Seeyon OA A6 createMysql.jsp Database - Information Disclosure

Identifier: seeyon_createmysql_exposure

Scanner(s) Support

GraphQL Scanner REST Scanner WebApp Scanner ASM Scanner

Description

Seeyon OA A6 has leaked sensitive database information. An attacker can obtain the database account and password MD5 by accessing a specific URL.

Reference:

Configuration

Example

Example configuration:

---
security_tests:
  seeyon_createmysql_exposure:
    skip: false

Reference

skip

Type : boolean

Skip the test if true.