Commit Graph

3 Commits

Author SHA1 Message Date
Jacob 32bf2e134f Fixes suggested by bcoles 2019-03-21 10:08:04 +00:00
bcoles 7b8f59d7bc Update modules/exploits/multi/postgres/postgres_cmd_execution_nine_three.rb
Co-Authored-By: Greenwolf <48361984+Greenwolf@users.noreply.github.com>
2019-03-21 09:33:29 +00:00
Jacob 7e91235551 Adding new Postgres_cmd_execution module
PostgreSQL from 9.3 to latest has functionality allowing the database superuser & users in the 'pg_read_server_files' group to execute OS commands. 

Explanation:
https://medium.com/greenwolf-security/authenticated-arbitrary-command-execution-on-postgresql-9-3-latest-cd18945914d5

This is my first run through of a Metasploit module so I would appreciate anyone helping me clean it up. It currently works on OSX & Linux by providing a cmd stager (like cmd/unix/reverse_perl), and on windows by first starting up a PowerShell download cradle, then putting the command in the COMMAND parameter. It feels a little hacky though 😁
2019-03-20 17:38:12 +00:00