mirror of
https://github.com/projectdiscovery/nuclei-templates.git
synced 2026-02-06 18:53:16 +08:00
47 lines
1009 B
YAML
47 lines
1009 B
YAML
id: postgres-weak-credentials
|
|
info:
|
|
name: Postgres - Default Logins
|
|
author: Ice3man
|
|
severity: high
|
|
description: |
|
|
Postgres service was accessed with easily guessed credentials.
|
|
metadata:
|
|
max-request: 9
|
|
shodan-query: port:5432
|
|
tags: js,postgres,default-login,network
|
|
|
|
javascript:
|
|
- pre-condition: |
|
|
var m = require("nuclei/postgres");
|
|
var c = m.PGClient();
|
|
c.IsPostgres(Host, Port);
|
|
|
|
code: |
|
|
var m = require("nuclei/postgres");
|
|
var c = m.PGClient();
|
|
c.Connect(Host, Port, User, Pass);
|
|
|
|
args:
|
|
Host: "{{Host}}"
|
|
Port: "5432"
|
|
User: "{{usernames}}"
|
|
Pass: "{{passwords}}"
|
|
|
|
attack: clusterbomb
|
|
payloads:
|
|
usernames:
|
|
- "postgres"
|
|
- "admin"
|
|
passwords:
|
|
- "password"
|
|
- "secret"
|
|
- "admin"
|
|
- "postgres"
|
|
|
|
stop-at-first-match: true
|
|
matchers:
|
|
- type: dsl
|
|
dsl:
|
|
- "response == true"
|
|
- "success == true"
|
|
condition: and |