nuclei-templates/javascript/misconfiguration/pgsql/pgsql-empty-password.yaml

38 lines
1.1 KiB
YAML
Raw Normal View History

id: pgsql-empty-password
2024-03-27 19:34:47 +00:00
info:
name: Postgresql Empty Password - Detect
author: pussycat0x
2024-03-29 07:59:52 +00:00
severity: critical
2024-03-27 19:34:47 +00:00
description: |
Postgresql has a flaw that allows the attacker to login with empty password.
reference:
- https://www.tenable.com/plugins/nessus/104031
metadata:
2024-04-01 08:19:09 +00:00
verified: true
max-request: 1
shodan-query: "product:\"PostgreSQL\""
2024-03-29 07:59:52 +00:00
tags: js,network,postgresql,authenticated
2024-07-10 12:08:01 +00:00
2024-03-27 19:34:47 +00:00
javascript:
2024-07-10 12:08:01 +00:00
- pre-condition: |
isPortOpen(Host,Port);
code: |
2024-03-27 19:34:47 +00:00
const postgres = require('nuclei/postgres');
const client = new postgres.PGClient;
const connected = client.Connect(Host, Port, User, Pass);
connected;
args:
Host: "{{Host}}"
Port: 5432
User: "postgres"
2024-03-29 07:59:52 +00:00
Pass: ""
2024-03-27 19:34:47 +00:00
matchers:
- type: dsl
dsl:
- "success == true"
- "response == true"
2024-03-29 08:06:01 +00:00
condition: and
# digest: 4a0a0047304502205ee2a786d94cd9a5bfdeab831b3ca79e72354e11f29b19fd2132991e46423a0502210093d8139f95431d620b8836105fc8911ac75324b2ce638441cc5b7fce5b409740:922c64590222798bb761d5b6d8e72950