38 lines
1.1 KiB
YAML
38 lines
1.1 KiB
YAML
id: pgsql-empty-password
|
|
|
|
info:
|
|
name: Postgresql Empty Password - Detect
|
|
author: pussycat0x
|
|
severity: critical
|
|
description: |
|
|
Postgresql has a flaw that allows the attacker to login with empty password.
|
|
reference:
|
|
- https://www.tenable.com/plugins/nessus/104031
|
|
metadata:
|
|
verified: true
|
|
max-request: 1
|
|
shodan-query: "product:\"PostgreSQL\""
|
|
tags: js,network,postgresql,authenticated
|
|
|
|
javascript:
|
|
- pre-condition: |
|
|
isPortOpen(Host,Port);
|
|
code: |
|
|
const postgres = require('nuclei/postgres');
|
|
const client = new postgres.PGClient;
|
|
const connected = client.Connect(Host, Port, User, Pass);
|
|
connected;
|
|
|
|
args:
|
|
Host: "{{Host}}"
|
|
Port: 5432
|
|
User: "postgres"
|
|
Pass: ""
|
|
|
|
matchers:
|
|
- type: dsl
|
|
dsl:
|
|
- "success == true"
|
|
- "response == true"
|
|
condition: and
|
|
# digest: 4a0a0047304502205ee2a786d94cd9a5bfdeab831b3ca79e72354e11f29b19fd2132991e46423a0502210093d8139f95431d620b8836105fc8911ac75324b2ce638441cc5b7fce5b409740:922c64590222798bb761d5b6d8e72950 |