Files
nuclei-templates/javascript/misconfiguration/pgsql/pgsql-empty-password.yaml

38 lines
1.1 KiB
YAML
Raw Permalink Normal View History

id: pgsql-empty-password
2024-03-28 01:04:47 +05:30
info:
name: Postgresql Empty Password - Detect
author: pussycat0x
2024-03-29 13:29:52 +05:30
severity: critical
2024-03-28 01:04:47 +05:30
description: |
Postgresql has a flaw that allows the attacker to login with empty password.
reference:
- https://www.tenable.com/plugins/nessus/104031
metadata:
2024-04-01 13:49:09 +05:30
verified: true
max-request: 1
shodan-query: "product:\"PostgreSQL\""
tags: js,network,postgresql,authenticated,vuln
2024-07-10 17:38:01 +05:30
2024-03-28 01:04:47 +05:30
javascript:
2024-07-10 17:38:01 +05:30
- pre-condition: |
isPortOpen(Host,Port);
code: |
2024-03-28 01:04:47 +05:30
const postgres = require('nuclei/postgres');
const client = new postgres.PGClient;
const connected = client.Connect(Host, Port, User, Pass);
connected;
args:
Host: "{{Host}}"
Port: 5432
User: "postgres"
2024-03-29 13:29:52 +05:30
Pass: ""
2024-03-28 01:04:47 +05:30
matchers:
- type: dsl
dsl:
- "success == true"
- "response == true"
2024-03-29 13:36:01 +05:30
condition: and
2025-10-26 16:17:34 +00:00
# digest: 4a0a00473045022100eb4e5630fcda14245b9ce01668fa4f76108fd21b6abeb1457233c89c6f5fdf740220674e56e64d0ad9e1ae06439c2c7fff41453084cd6b813cd7c71389bfbf4461ef:922c64590222798bb761d5b6d8e72950