Skip to content

phpMyFAQ Installation - Exposure

ID: phpmyfaq-installer

Severity: high

Author: ritikchaddha

Tags: misconfig,phpmyfaq,install

phpMyFAQ installation is exposed.

id: phpmyfaq-installer
info:
name: phpMyFAQ Installation - Exposure
author: ritikchaddha
severity: high
description: phpMyFAQ installation is exposed.
classification:
cpe: cpe:2.3:a:phpmyfaq:phpmyfaq:*:*:*:*:*:*:*:*
metadata:
verified: true
max-request: 1
vendor: phpmyfaq
product: phpmyfaq
fofa-query: "phpMyFAQ-setup"
tags: misconfig,phpmyfaq,install
http:
- method: GET
path:
- "{{BaseURL}}/setup/index.php"
matchers-condition: or
matchers:
- type: word
part: body
words:
- '<title>phpMyFAQ'
- 'Setup</title>'
condition: and
- type: word
part: header
words:
- 'phpmyfaq-setup'
# digest: 4a0a00473045022100da4c22cdca781bf3f18273fd6bd359a8361a167fd415706f2710b96912692c81022078ae4ccf33211b50b058aa455beacd4acaf79ba8f1483ab5565688596922378f:922c64590222798bb761d5b6d8e72950

This template is used to detect vulnerabilities in web applications. It can be used with the Nuclei tool to scan for specific patterns or behaviors.

Terminal window
$ nuclei -u "URL" -t "http/misconfiguration/installer/phpmyfaq-installer.yaml"

View on Github