2024-04-15 08:14:23 +07:00
|
|
|
id: pgsql-empty-password
|
2024-03-28 01:04:47 +05:30
|
|
|
|
|
|
|
|
info:
|
|
|
|
|
name: Postgresql Empty Password - Detect
|
|
|
|
|
author: pussycat0x
|
2024-03-29 13:29:52 +05:30
|
|
|
severity: critical
|
2024-03-28 01:04:47 +05:30
|
|
|
description: |
|
|
|
|
|
Postgresql has a flaw that allows the attacker to login with empty password.
|
|
|
|
|
reference:
|
|
|
|
|
- https://www.tenable.com/plugins/nessus/104031
|
|
|
|
|
metadata:
|
2024-04-01 13:49:09 +05:30
|
|
|
verified: true
|
2025-05-27 10:39:47 +08:00
|
|
|
max-request: 1
|
|
|
|
|
shodan-query: "product:\"PostgreSQL\""
|
2025-10-17 14:17:02 +02:00
|
|
|
tags: js,network,postgresql,authenticated,vuln
|
2024-07-10 17:38:01 +05:30
|
|
|
|
2024-03-28 01:04:47 +05:30
|
|
|
javascript:
|
2024-07-10 17:38:01 +05:30
|
|
|
- pre-condition: |
|
|
|
|
|
isPortOpen(Host,Port);
|
|
|
|
|
code: |
|
2024-03-28 01:04:47 +05:30
|
|
|
const postgres = require('nuclei/postgres');
|
|
|
|
|
const client = new postgres.PGClient;
|
|
|
|
|
const connected = client.Connect(Host, Port, User, Pass);
|
|
|
|
|
connected;
|
|
|
|
|
|
|
|
|
|
args:
|
|
|
|
|
Host: "{{Host}}"
|
|
|
|
|
Port: 5432
|
|
|
|
|
User: "postgres"
|
2024-03-29 13:29:52 +05:30
|
|
|
Pass: ""
|
2024-03-28 01:04:47 +05:30
|
|
|
|
|
|
|
|
matchers:
|
|
|
|
|
- type: dsl
|
|
|
|
|
dsl:
|
|
|
|
|
- "success == true"
|
|
|
|
|
- "response == true"
|
2024-03-29 13:36:01 +05:30
|
|
|
condition: and
|
2025-10-26 16:17:34 +00:00
|
|
|
# digest: 4a0a00473045022100eb4e5630fcda14245b9ce01668fa4f76108fd21b6abeb1457233c89c6f5fdf740220674e56e64d0ad9e1ae06439c2c7fff41453084cd6b813cd7c71389bfbf4461ef:922c64590222798bb761d5b6d8e72950
|