Back to Library

Find phpinfo() Pages

PRO

Finds exposed phpinfo() pages revealing MySQL default passwords, PHP configuration, and Zend engine details.

Beginner Friendly
High risk - authorized use only
vulnerability

Google Dork Query:

••••••••••••••••••••••••••••••••••
0
Not verified

What It Does

This dork uses 'intitle:phpinfo()' combined with 'mysql.default_password' and 'Zend Scripting Language Engine' to find PHP information pages that display sensitive server configuration. These pages reveal database passwords, file paths, loaded modules, and server environment variables.

Common Use Cases

  • Credential Exposure Audit: Find phpinfo() pages that expose MySQL default passwords and other database connection credentials.
  • Server Fingerprinting: Gather detailed PHP version, module, and configuration information for vulnerability research during authorized testing.
  • Configuration Leak Detection: Identify servers where phpinfo() is publicly accessible, potentially leaking sensitive environment variables and paths.

How to Use Safely

  1. Execute the dork in Google to find publicly accessible phpinfo() pages.
  2. Search the page for mysql.default_password, database host, and other credential entries.
  3. Note PHP version, loaded extensions, and server paths for further assessment.
  4. Report exposed phpinfo() pages and recommend disabling them in production or restricting access.

Responsible Use Required

This dork should only be used on systems you own or have explicit authorization to test. Unauthorized access to computer systems is illegal. Always follow ethical guidelines and obtain proper permission before testing.

TAGS

mysql
php