DBeaver - Credentials Discovery
ID: dbeaver-credentials
Severity: medium
Author: geeknik,j4vaovo
Tags: exposure,dbeaver
Description
Section titled “Description”DBeaver credentials were discovered.
YAML Source
Section titled “YAML Source”id: dbeaver-credentials
info: name: DBeaver - Credentials Discovery author: geeknik,j4vaovo severity: medium description: DBeaver credentials were discovered. classification: cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N cvss-score: 5.8 cwe-id: CWE-522 metadata: max-request: 2 tags: exposure,dbeavervariables: str: "{{rand_base(6)}}"
http: - raw: - | GET /{{str}}.json HTTP/1.1 Host: {{Hostname}} - | GET /.dbeaver/credentials-config.json HTTP/1.1 Host: {{Hostname}}
# To decode the credentials file, use following command: # openssl aes-128-cbc -d -K "babb4a9f774ab853c96c2d653dfe544a" -iv 00000000000000000000000000000000 -in credentials-config.json | dd bs=1 skip=16 2>/dev/null matchers-condition: and matchers: - type: dsl dsl: - "status_code_2 == 200" - "len(body_2) > 2" - "contains(header_2, 'application/octet-stream')" - "len(body_1) != len(body_2)" - "!contains(tolower(body_2), '<html')" - "!contains(tolower(body_2), '<body')" - "!contains(tolower(body_2), '<iframe')" condition: and# digest: 4a0a00473045022018488b1cc7076afdcdad76caae9478dedda9b2e055829b794505a5c57d441e790221008979742fd8f25476cacc721d64aa560227c30aab51d28a16781e7c975100ba4a:922c64590222798bb761d5b6d8e72950Guide to check the vulnerabilities
Section titled “Guide to check the vulnerabilities”This template is used to detect vulnerabilities in web applications. It can be used with the Nuclei tool to scan for specific patterns or behaviors.
$ nuclei -u "URL" -t "http/exposures/configs/dbeaver-credentials.yaml"