postrest-api-exposure: PostgREST API Server - Exposure

日期: 2025-12-02 | 影响软件: PostgREST API Server | POC: 已公开

漏洞描述

PostgREST API Server was detected and appeared to be accessible without authentication.

PoC代码[已公开]

id: postrest-api-exposure

info:
  name: PostgREST API Server  - Exposure
  author: DhiyaneshDk
  severity: high
  description: |
    PostgREST API Server was detected and appeared to be accessible without authentication.
  classification:
    cwe-id: CWE-200
  metadata:
    verified: true
    max-request: 1
    shodan-query: html:"PostgREST"
  tags: postgrest,misconfig,unauth,vuln

http:
  - method: GET
    path:
      - "{{BaseURL}}"

    host-redirects: true
    max-redirects: 2

    matchers:
      - type: dsl
        dsl:
          - 'contains_all(body, "PostgREST API","pgrst.object")'
          - 'status_code == 200'
        condition: and
# digest: 490a0046304402207751a82158353931b1cb9ab80ca4ffcd844ad4420a124e4b268a98119b96414e02207dd920eec609e2a1038c65534d646da12d365d9ea39d7339b741dd1e3df534c1:922c64590222798bb761d5b6d8e72950

相关漏洞推荐