Skip to content

Information Disclosure: Exposed MySQL Config

Identifier: exposed_mysql_config

Scanner(s) Support

GraphQL Scanner REST Scanner WebApp Scanner ASM Scanner

Description

When MySQL configuration files are accidentally made public, attackers can view sensitive details like usernames, passwords, and connection info, potentially allowing unauthorized database access and data breaches.

How we test: We scan for exposed MySQL configuration files such as mysql.initial and analyze responses to detect if sensitive database credentials and connection information are accessible via web servers.

Configuration

Example

Example configuration:

---
security_tests:
  exposed_mysql_config:
    skip: false

Reference

skip

Type : boolean

Skip the test if true.