Skip to content

Sensitive Data: Seeyon OA A6 createMysql.jsp Database - Information Disclosure

Identifier: seeyon_createmysql_exposure

Scanner(s) Support

GraphQL Scanner REST Scanner WebApp Scanner ASM Scanner

Description

Seeyon OA A6 leaks sensitive database information, allowing attackers to obtain database account and password MD5 hashes by accessing specific URLs.

How we test: We test for database information disclosure vulnerabilities in Seeyon OA A6 by attempting to access createMysql.jsp endpoints and analyzing responses to detect if database credentials are exposed.

Reference:

Configuration

Example

Example configuration:

---
security_tests:
  seeyon_createmysql_exposure:
    skip: false

Reference

skip

Type : boolean

Skip the test if true.