Files
metasploit-gs/lib/msf/core/optional_session/postgresql.rb
T
2024-02-14 15:37:11 +00:00

37 lines
1.1 KiB
Ruby

# frozen_string_literal: true
module Msf
module OptionalSession
module PostgreSQL
include Msf::OptionalSession
def initialize(info = {})
super(
update_info(
info,
'SessionTypes' => %w[postgresql]
)
)
if framework.features.enabled?(Msf::FeatureManager::POSTGRESQL_SESSION_TYPE)
register_options(
[
Msf::OptInt.new('SESSION', [ false, 'The session to run this module on' ]),
Msf::OptString.new('DATABASE', [ false, 'The database to authenticate against', 'postgres']),
Msf::OptString.new('USERNAME', [ false, 'The username to authenticate as', 'postgres']),
Msf::Opt::RHOST(nil, false),
Msf::Opt::RPORT(5432, false)
]
)
add_info('New in Metasploit 6.4 - This module can target a %grnSESSION%clr or an %grnRHOST%clr')
end
end
def session
return nil unless framework.features.enabled?(Msf::FeatureManager::POSTGRESQL_SESSION_TYPE)
super
end
end
end
end