You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
This Nuclei template detects a vulnerability in RabbitMQ services exposed on port 5672, where the default guest/guest credentials are used. If these default credentials are not changed, an attacker can potentially gain unauthorized access to the RabbitMQ service and manipulate message queues or access sensitive data.
This template attempts to authenticate with the default guest/guest username and password on port 5672. If the connection is successful, it indicates the presence of weak authentication settings on the RabbitMQ service.
Vulnerability Details:
Default Credentials: guest/guest
Vulnerable Port: 5672 (AMQP)
Potential Impact: Unauthorized access to RabbitMQ service, message interception, and possible disruption of message queues.
Is there an existing template for this?
Template requests
RabbitMQ Weak Password AMQP 5672 POC
This Nuclei template detects a vulnerability in RabbitMQ services exposed on port 5672, where the default guest/guest credentials are used. If these default credentials are not changed, an attacker can potentially gain unauthorized access to the RabbitMQ service and manipulate message queues or access sensitive data.
This template attempts to authenticate with the default guest/guest username and password on port 5672. If the connection is successful, it indicates the presence of weak authentication settings on the RabbitMQ service.
Vulnerability Details:
You can find the template here:
https://github.com/h1thub/rabbitmq-weak-password-amqp-5672/
Anything else?
No response
The text was updated successfully, but these errors were encountered: