Advertisement






Nazyh.net MySQL credentials in html source code Vulnerability

CVE Category Price Severity
N/A CWE-522 N/A High
Author Risk Exploitation Type Date
N/A High Remote 2018-04-18
CPE
cpe:cpe:/a:mysql:mysql_server
CVSS EPSS EPSSP
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N 0.0191 0.4992

CVSS vector description

Our sensors found this exploit at: https://cxsecurity.com/ascii/WLB-2018040155

Below is a copy:

Nazyh.net MySQL credentials in html source code Vulnerability
====================================================================================================================================
| # Title     : Nazyh.net MySQL credentials in html source code Vulnerability                                                      |
| # Author    : indoushka                                                                                                          |
| # Telegram  : @indoushka                                                                                                         |
| # Tested on : windows 10 Franais V.(Pro)                                                                                        |                                                                                                           |
| # Vendor    : http://www.palaisdelaculture.dz/                                                                                   |  
| # Dork      : Conception : nazyh.net                                                                                             |
====================================================================================================================================


poc :

For a client program to be able to connect to the MySQL server, 
it must use the proper connection parameters, 
such as the name of the host where the server is running and 
the user name and password of your MySQL account. 
This file contains full/partial source code that contains 
a mysql_connect/mysql_pconnect function call that includes 
the MySQL connection credentials. This information 
is highly sensitive and should not be found on a production system.

[+] right click and open the page source .

[+] go to line 78 

<?
include("bokajnr.inc");
$database="db1000478_palaisculture";
$racine=" ";
mysql_connect($bhost, $buser, $bpassword);
?>

[+] now you can download the config file : http://www.palaisdelaculture.dz/bokajnr.inc

Greetings to :=========================================================================================================================
                                                                                                                                      |
jericho * Larry W. Cashdollar * brutelogic* shadow_00715* 9aylas * djroot.dz * LiquidWorm* Hussin-X *D4NB4R * ViRuS_Ra3cH * yasMouh   |
                                                                                                                                      |
=======================================================================================================================================

Copyright ©2024 Exploitalert.

This information is provided for TESTING and LEGAL RESEARCH purposes only.
All trademarks used are properties of their respective owners. By visiting this website you agree to Terms of Use and Privacy Policy and Impressum