漏洞描述
PostgREST API Server was detected and appeared to be accessible without authentication.
id: postrest-api-exposure
info:
name: PostgREST API Server - Exposure
author: DhiyaneshDk
severity: high
description: |
PostgREST API Server was detected and appeared to be accessible without authentication.
classification:
cwe-id: CWE-200
metadata:
verified: true
max-request: 1
shodan-query: html:"PostgREST"
tags: postgrest,misconfig,unauth,vuln
http:
- method: GET
path:
- "{{BaseURL}}"
host-redirects: true
max-redirects: 2
matchers:
- type: dsl
dsl:
- 'contains_all(body, "PostgREST API","pgrst.object")'
- 'status_code == 200'
condition: and
# digest: 490a0046304402207751a82158353931b1cb9ab80ca4ffcd844ad4420a124e4b268a98119b96414e02207dd920eec609e2a1038c65534d646da12d365d9ea39d7339b741dd1e3df534c1:922c64590222798bb761d5b6d8e72950