nuclei-templates/javascript/default-logins/redis-default-logins.yaml

55 lines
1.4 KiB
YAML

id: redis-default-logins
info:
name: Redis - Default Logins
author: tarunKoyalwar
severity: high
description: |
Redis service was accessed with easily guessed credentials.
metadata:
max-request: 6
shodan-query:
- product:"redis"
- http.title:"airflow - dags" || http.html:"apache airflow"
- http.title:"sign in - airflow"
product: airflow
vendor: apache
fofa-query:
- apache airflow
- title="airflow - dags" || http.html:"apache airflow"
- title="sign in - airflow"
google-query:
- intitle:"airflow - dags" || http.html:"apache airflow"
- intitle:"sign in - airflow"
tags: js,redis,default-login,network
javascript:
- pre-condition: |
isPortOpen(Host,Port)
code: |
var m = require("nuclei/redis");
m.GetServerInfoAuth(Host,Port,Password);
args:
Host: "{{Host}}"
Port: "6379"
Password: "{{passwords}}"
payloads:
passwords:
- ""
- root
- password
- admin
- iamadmin
stop-at-first-match: true
matchers-condition: and
matchers:
- type: word
words:
- "redis_version"
- type: word
negative: true
words:
- "redis_mode:sentinel"
# digest: 4a0a00473045022100a877c50a02d8cf0352dd75792350050a664d4bd5d6b8c456604e493044d33190022043f376210ce1b9ff19eb2de3d21465031df88680722ff767dc8ac0413a8729b1:922c64590222798bb761d5b6d8e72950