Information Disclosure: Exposed MySQL Config¶
Identifier:
exposed_mysql_config
Scanner(s) Support¶
| GraphQL Scanner | REST Scanner | WebApp Scanner | ASM Scanner |
|---|---|---|---|
Description¶
When MySQL configuration files are accidentally made public, attackers can view sensitive details like usernames, passwords, and connection info, potentially allowing unauthorized database access and data breaches.
How we test: We scan for exposed MySQL configuration files such as mysql.initial and analyze responses to detect if sensitive database credentials and connection information are accessible via web servers.
Configuration¶
Example¶
Example configuration:
Reference¶
skip¶
Type : boolean
Skip the test if true.