sqlite-history-exposure: SQLite History - Exposure

日期: 2026-01-24 | 影响软件: SQLite History | POC: 已公开

漏洞描述

Detects exposed .sqlite_history files. These files contain SQLite command history, including executed queries, table names, and potentially sensitive data that was queried or inserted.

PoC代码[已公开]

id: sqlite-history-exposure

info:
  name: SQLite History - Exposure
  author: theamanrawat
  severity: medium
  description: |
    Detects exposed .sqlite_history files. These files contain SQLite command history, including executed queries, table names, and potentially sensitive data that was queried or inserted.
  impact: |
    Exposed SQLite history can reveal database schema, table structures, sensitive SQL queries (with credentials or tokens), and business logic.
  metadata:
    verified: true
    max-request: 1
    shodan-query: http.html:"CREATE TABLE" http.html:"SELECT"
    fofa-query: body=".schema" && body="SELECT"
    google-dork: intitle:"index of" ".sqlite_history"
  tags: exposure,sqlite,history,database,misconfig

http:
  - method: GET
    path:
      - "{{BaseURL}}/.sqlite_history"

    matchers-condition: and
    matchers:
      - type: dsl
        dsl:
          - 'contains_any(to_lower(body), "select", "insert", "create table", "update", "delete from", ".tables", ".schema",".databases")'
          - 'status_code == 200'
        condition: and

      - type: regex
        part: body
        regex:
          - '(?i)(select|insert|update|delete|create|alter|drop|\.quit|\.schema|\.tables).*[\r\n]+(select|insert|update|delete|create|alter|drop|\.quit|\.schema|\.tables)'

      - type: word
        part: body
        words:
          - "<html"
          - "<!DOCTYPE"
          - "<head"
          - "<body"
          - '{"'
          - '"error"'
          - '"message"'
        negative: true
# digest: 4b0a00483046022100d64ebc4e0fa680ddfda0aa91d2b95e017d7eb7d42d86c1780ad96d31a40360db022100ce27556382503defc6b28c660e2eb7fa58d3048e1cdb6d1bc4332e797a585d34:922c64590222798bb761d5b6d8e72950

相关漏洞推荐