id: postgres-weak-credentials info: name: Postgres - Default Logins author: Ice3man severity: high description: | Postgres service was accessed with easily guessed credentials. metadata: max-request: 9 shodan-query: port:5432 tags: js,postgres,default-login,network javascript: - pre-condition: | var m = require("nuclei/postgres"); var c = m.PGClient(); c.IsPostgres(Host, Port); code: | var m = require("nuclei/postgres"); var c = m.PGClient(); c.Connect(Host, Port, User, Pass); args: Host: "{{Host}}" Port: "5432" User: "{{usernames}}" Pass: "{{passwords}}" attack: clusterbomb payloads: usernames: - "postgres" - "admin" passwords: - "password" - "secret" - "admin" - "postgres" stop-at-first-match: true matchers: - type: dsl dsl: - "response == true" - "success == true" condition: and