mirror of
https://github.com/projectdiscovery/nuclei-templates.git
synced 2026-02-03 09:13:22 +08:00
Update and rename postgresql-empty-password.yaml to pgsql-empty-password.yaml
This commit is contained in:
35
javascript/misconfiguration/pgsql/pgsql-empty-password.yaml
Normal file
35
javascript/misconfiguration/pgsql/pgsql-empty-password.yaml
Normal file
@@ -0,0 +1,35 @@
|
||||
id: pgsql-empty-password
|
||||
|
||||
info:
|
||||
name: Postgresql Empty Password - Detect
|
||||
author: pussycat0x
|
||||
severity: critical
|
||||
description: |
|
||||
Postgresql has a flaw that allows the attacker to login with empty password.
|
||||
reference:
|
||||
- https://www.tenable.com/plugins/nessus/104031
|
||||
metadata:
|
||||
shodan-query: product:"PostgreSQL"
|
||||
verified: true
|
||||
tags: js,network,postgresql,authenticated
|
||||
|
||||
javascript:
|
||||
- code: |
|
||||
const postgres = require('nuclei/postgres');
|
||||
const client = new postgres.PGClient;
|
||||
const connected = client.Connect(Host, Port, User, Pass);
|
||||
connected;
|
||||
|
||||
args:
|
||||
Host: "{{Host}}"
|
||||
Port: 5432
|
||||
User: "postgres"
|
||||
Pass: ""
|
||||
|
||||
matchers:
|
||||
- type: dsl
|
||||
dsl:
|
||||
- "success == true"
|
||||
- "response == true"
|
||||
condition: and
|
||||
# digest: 490a004630440220538dc891e334a92a87ed69dc657a9906b8c70e18bd9d92c01c88165cf76416ad0220560867521ce6635eb8758da53dbff4bd9f2cc1642d7b5fb99eaa3b627d6260ba:922c64590222798bb761d5b6d8e72950
|
||||
Reference in New Issue
Block a user