Files
nuclei-templates/javascript/misconfiguration/pgsql/pgsql-empty-password.yaml

35 lines
1.0 KiB
YAML
Raw Normal View History

id: pgsql-empty-password
2024-03-28 01:04:47 +05:30
info:
name: Postgresql Empty Password - Detect
author: pussycat0x
2024-03-29 13:29:52 +05:30
severity: critical
2024-03-28 01:04:47 +05:30
description: |
Postgresql has a flaw that allows the attacker to login with empty password.
reference:
- https://www.tenable.com/plugins/nessus/104031
metadata:
2024-04-01 13:49:09 +05:30
verified: true
max-request: 1
shodan-query: "product:\"PostgreSQL\""
2024-03-29 13:29:52 +05:30
tags: js,network,postgresql,authenticated
2024-03-28 01:04:47 +05:30
javascript:
- code: |
const postgres = require('nuclei/postgres');
const client = new postgres.PGClient;
const connected = client.Connect(Host, Port, User, Pass);
connected;
args:
Host: "{{Host}}"
Port: 5432
User: "postgres"
2024-03-29 13:29:52 +05:30
Pass: ""
2024-03-28 01:04:47 +05:30
matchers:
- type: dsl
dsl:
- "success == true"
- "response == true"
2024-03-29 13:36:01 +05:30
condition: and
# digest: 4b0a00483046022100c41f1f8bb8de60be5381d7052e6c77ad73f27054ea9d902521b0e329ec680285022100fd672f62deb4391db2aad9e1e2761026e9f8c83fd218b6d8a0483c6919ced3ae:922c64590222798bb761d5b6d8e72950