mirror of
https://github.com/projectdiscovery/nuclei-templates.git
synced 2026-02-12 13:43:24 +08:00
45 lines
1.2 KiB
YAML
45 lines
1.2 KiB
YAML
id: postgres-weak-credentials
|
|
|
|
info:
|
|
name: Postgres - Default Logins
|
|
author: Ice3man
|
|
severity: high
|
|
description: |
|
|
Postgres service was accessed with easily guessed credentials.
|
|
metadata:
|
|
max-request: 9
|
|
shodan-query: port:5432
|
|
tags: js,postgresql,default-login,network
|
|
|
|
javascript:
|
|
- pre-condition: |
|
|
var m = require("nuclei/postgres");
|
|
var c = m.PGClient();
|
|
c.IsPostgres(Host, Port);
|
|
code: |
|
|
var m = require("nuclei/postgres");
|
|
var c = m.PGClient();
|
|
c.Connect(Host, Port, User, Pass);
|
|
args:
|
|
Host: "{{Host}}"
|
|
Port: "5432"
|
|
User: "{{usernames}}"
|
|
Pass: "{{passwords}}"
|
|
attack: clusterbomb
|
|
payloads:
|
|
usernames:
|
|
- "postgres"
|
|
- "admin"
|
|
passwords:
|
|
- "password"
|
|
- "secret"
|
|
- "admin"
|
|
- "postgres"
|
|
stop-at-first-match: true
|
|
matchers:
|
|
- type: dsl
|
|
dsl:
|
|
- "response == true"
|
|
- "success == true"
|
|
condition: and
|
|
# digest: 4b0a00483046022100d2bf0499064b63c5d3c45ff227d32750ed89de15e8287a48ef8b0f5d77371ca8022100bd1b1a06687d53103ffb93505934cb29353243279935d27d3fc996ce99109781:922c64590222798bb761d5b6d8e72950 |