55 lines
1.4 KiB
YAML
55 lines
1.4 KiB
YAML
id: redis-default-logins
|
|
|
|
info:
|
|
name: Redis - Default Logins
|
|
author: tarunKoyalwar
|
|
severity: high
|
|
description: |
|
|
Redis service was accessed with easily guessed credentials.
|
|
metadata:
|
|
max-request: 6
|
|
shodan-query:
|
|
- product:"redis"
|
|
- http.title:"airflow - dags" || http.html:"apache airflow"
|
|
- http.title:"sign in - airflow"
|
|
product: airflow
|
|
vendor: apache
|
|
fofa-query:
|
|
- apache airflow
|
|
- title="airflow - dags" || http.html:"apache airflow"
|
|
- title="sign in - airflow"
|
|
google-query:
|
|
- intitle:"airflow - dags" || http.html:"apache airflow"
|
|
- intitle:"sign in - airflow"
|
|
tags: js,redis,default-login,network
|
|
|
|
javascript:
|
|
- pre-condition: |
|
|
isPortOpen(Host,Port)
|
|
code: |
|
|
var m = require("nuclei/redis");
|
|
m.GetServerInfoAuth(Host,Port,Password);
|
|
args:
|
|
Host: "{{Host}}"
|
|
Port: "6379"
|
|
Password: "{{passwords}}"
|
|
payloads:
|
|
passwords:
|
|
- ""
|
|
- root
|
|
- password
|
|
- admin
|
|
- iamadmin
|
|
stop-at-first-match: true
|
|
|
|
matchers-condition: and
|
|
matchers:
|
|
- type: word
|
|
words:
|
|
- "redis_version"
|
|
|
|
- type: word
|
|
negative: true
|
|
words:
|
|
- "redis_mode:sentinel"
|
|
# digest: 4a0a00473045022100a877c50a02d8cf0352dd75792350050a664d4bd5d6b8c456604e493044d33190022043f376210ce1b9ff19eb2de3d21465031df88680722ff767dc8ac0413a8729b1:922c64590222798bb761d5b6d8e72950 |