mirror of
https://github.com/projectdiscovery/nuclei.git
synced 2025-12-17 23:05:26 +00:00
* introducing execution id * wip * . * adding separate execution context id * lint * vet * fixing pg dialers * test ignore * fixing loader FD limit * test * fd fix * wip: remove CloseProcesses() from dev merge * wip: fix merge issue * protocolstate: stop memguarding on last dialer delete * avoid data race in dialers.RawHTTPClient * use shared logger and avoid race conditions * use shared logger and avoid race conditions * go mod * patch executionId into compiled template cache * clean up comment in Parse * go mod update * bump echarts * address merge issues * fix use of gologger * switch cmd/nuclei to options.Logger * address merge issues with go.mod * go vet: address copy of lock with new Copy function * fixing tests * disable speed control * fix nil ExecuterOptions * removing deprecated code * fixing result print * default logger * cli default logger * filter warning from results * fix performance test * hardcoding path * disable upload * refactor(runner): uses `Warning` instead of `Print` for `pdcpUploadErrMsg` Signed-off-by: Dwi Siswanto <git@dw1.io> * Revert "disable upload" This reverts commit 114fbe6663361bf41cf8b2645fd2d57083d53682. * Revert "hardcoding path" This reverts commit cf12ca800e0a0e974bd9fd4826a24e51547f7c00. --------- Signed-off-by: Dwi Siswanto <git@dw1.io> Co-authored-by: Mzack9999 <mzack9999@protonmail.com> Co-authored-by: Dwi Siswanto <git@dw1.io> Co-authored-by: Dwi Siswanto <25837540+dwisiswant0@users.noreply.github.com>
227 lines
6.9 KiB
Go
227 lines
6.9 KiB
Go
package postgres
|
|
|
|
import (
|
|
"context"
|
|
"database/sql"
|
|
"fmt"
|
|
"net"
|
|
"strings"
|
|
"time"
|
|
|
|
"github.com/go-pg/pg"
|
|
"github.com/praetorian-inc/fingerprintx/pkg/plugins"
|
|
postgres "github.com/praetorian-inc/fingerprintx/pkg/plugins/services/postgresql"
|
|
utils "github.com/projectdiscovery/nuclei/v3/pkg/js/utils"
|
|
"github.com/projectdiscovery/nuclei/v3/pkg/js/utils/pgwrap" //nolint:staticcheck // need to call init
|
|
_ "github.com/projectdiscovery/nuclei/v3/pkg/js/utils/pgwrap" //nolint:staticcheck
|
|
"github.com/projectdiscovery/nuclei/v3/pkg/protocols/common/protocolstate"
|
|
)
|
|
|
|
type (
|
|
// PGClient is a client for Postgres database.
|
|
// Internally client uses go-pg/pg driver.
|
|
// @example
|
|
// ```javascript
|
|
// const postgres = require('nuclei/postgres');
|
|
// const client = new postgres.PGClient;
|
|
// ```
|
|
PGClient struct{}
|
|
)
|
|
|
|
// IsPostgres checks if the given host and port are running Postgres database.
|
|
// If connection is successful, it returns true.
|
|
// If connection is unsuccessful, it returns false and error.
|
|
// @example
|
|
// ```javascript
|
|
// const postgres = require('nuclei/postgres');
|
|
// const isPostgres = postgres.IsPostgres('acme.com', 5432);
|
|
// ```
|
|
func (c *PGClient) IsPostgres(ctx context.Context, host string, port int) (bool, error) {
|
|
executionId := ctx.Value("executionId").(string)
|
|
// todo: why this is exposed? Service fingerprint should be automatic
|
|
return memoizedisPostgres(executionId, host, port)
|
|
}
|
|
|
|
// @memo
|
|
func isPostgres(executionId string, host string, port int) (bool, error) {
|
|
timeout := 10 * time.Second
|
|
|
|
dialer := protocolstate.GetDialersWithId(executionId)
|
|
if dialer == nil {
|
|
return false, fmt.Errorf("dialers not initialized for %s", executionId)
|
|
}
|
|
|
|
conn, err := dialer.Fastdialer.Dial(context.TODO(), "tcp", fmt.Sprintf("%s:%d", host, port))
|
|
if err != nil {
|
|
return false, err
|
|
}
|
|
defer func() {
|
|
_ = conn.Close()
|
|
}()
|
|
|
|
_ = conn.SetDeadline(time.Now().Add(timeout))
|
|
|
|
plugin := &postgres.POSTGRESPlugin{}
|
|
service, err := plugin.Run(conn, timeout, plugins.Target{Host: host})
|
|
if err != nil {
|
|
return false, err
|
|
}
|
|
if service == nil {
|
|
return false, nil
|
|
}
|
|
return true, nil
|
|
}
|
|
|
|
// Connect connects to Postgres database using given credentials.
|
|
// If connection is successful, it returns true.
|
|
// If connection is unsuccessful, it returns false and error.
|
|
// The connection is closed after the function returns.
|
|
// @example
|
|
// ```javascript
|
|
// const postgres = require('nuclei/postgres');
|
|
// const client = new postgres.PGClient;
|
|
// const connected = client.Connect('acme.com', 5432, 'username', 'password');
|
|
// ```
|
|
func (c *PGClient) Connect(ctx context.Context, host string, port int, username, password string) (bool, error) {
|
|
ok, err := c.IsPostgres(ctx, host, port)
|
|
if err != nil {
|
|
return false, err
|
|
}
|
|
if !ok {
|
|
return false, fmt.Errorf("not a postgres service")
|
|
}
|
|
executionId := ctx.Value("executionId").(string)
|
|
return memoizedconnect(executionId, host, port, username, password, "postgres")
|
|
}
|
|
|
|
// ExecuteQuery connects to Postgres database using given credentials and database name.
|
|
// and executes a query on the db.
|
|
// If connection is successful, it returns the result of the query.
|
|
// @example
|
|
// ```javascript
|
|
// const postgres = require('nuclei/postgres');
|
|
// const client = new postgres.PGClient;
|
|
// const result = client.ExecuteQuery('acme.com', 5432, 'username', 'password', 'dbname', 'select * from users');
|
|
// log(to_json(result));
|
|
// ```
|
|
func (c *PGClient) ExecuteQuery(ctx context.Context, host string, port int, username, password, dbName, query string) (*utils.SQLResult, error) {
|
|
ok, err := c.IsPostgres(ctx, host, port)
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
if !ok {
|
|
return nil, fmt.Errorf("not a postgres service")
|
|
}
|
|
|
|
executionId := ctx.Value("executionId").(string)
|
|
|
|
return memoizedexecuteQuery(executionId, host, port, username, password, dbName, query)
|
|
}
|
|
|
|
// @memo
|
|
func executeQuery(executionId string, host string, port int, username string, password string, dbName string, query string) (*utils.SQLResult, error) {
|
|
if !protocolstate.IsHostAllowed(executionId, host) {
|
|
// host is not valid according to network policy
|
|
return nil, protocolstate.ErrHostDenied.Msgf(host)
|
|
}
|
|
|
|
target := net.JoinHostPort(host, fmt.Sprintf("%d", port))
|
|
|
|
connStr := fmt.Sprintf("postgres://%s:%s@%s/%s?sslmode=disable&executionId=%s", username, password, target, dbName, executionId)
|
|
db, err := sql.Open(pgwrap.PGWrapDriver, connStr)
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
defer func() {
|
|
_ = db.Close()
|
|
}()
|
|
|
|
rows, err := db.Query(query)
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
resp, err := utils.UnmarshalSQLRows(rows)
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
return resp, nil
|
|
}
|
|
|
|
// ConnectWithDB connects to Postgres database using given credentials and database name.
|
|
// If connection is successful, it returns true.
|
|
// If connection is unsuccessful, it returns false and error.
|
|
// The connection is closed after the function returns.
|
|
// @example
|
|
// ```javascript
|
|
// const postgres = require('nuclei/postgres');
|
|
// const client = new postgres.PGClient;
|
|
// const connected = client.ConnectWithDB('acme.com', 5432, 'username', 'password', 'dbname');
|
|
// ```
|
|
func (c *PGClient) ConnectWithDB(ctx context.Context, host string, port int, username, password, dbName string) (bool, error) {
|
|
ok, err := c.IsPostgres(ctx, host, port)
|
|
if err != nil {
|
|
return false, err
|
|
}
|
|
if !ok {
|
|
return false, fmt.Errorf("not a postgres service")
|
|
}
|
|
|
|
executionId := ctx.Value("executionId").(string)
|
|
|
|
return memoizedconnect(executionId, host, port, username, password, dbName)
|
|
}
|
|
|
|
// @memo
|
|
func connect(executionId string, host string, port int, username string, password string, dbName string) (bool, error) {
|
|
if host == "" || port <= 0 {
|
|
return false, fmt.Errorf("invalid host or port")
|
|
}
|
|
|
|
if !protocolstate.IsHostAllowed(executionId, host) {
|
|
// host is not valid according to network policy
|
|
return false, protocolstate.ErrHostDenied.Msgf(host)
|
|
}
|
|
|
|
target := net.JoinHostPort(host, fmt.Sprintf("%d", port))
|
|
|
|
ctx, cancel := context.WithCancel(context.Background())
|
|
defer cancel()
|
|
|
|
dialer := protocolstate.GetDialersWithId(executionId)
|
|
if dialer == nil {
|
|
return false, fmt.Errorf("dialers not initialized for %s", executionId)
|
|
}
|
|
|
|
db := pg.Connect(&pg.Options{
|
|
Addr: target,
|
|
User: username,
|
|
Password: password,
|
|
Database: dbName,
|
|
Dialer: func(network, addr string) (net.Conn, error) {
|
|
return dialer.Fastdialer.Dial(context.Background(), network, addr)
|
|
},
|
|
IdleCheckFrequency: -1,
|
|
}).WithContext(ctx).WithTimeout(10 * time.Second)
|
|
defer func() {
|
|
_ = db.Close()
|
|
}()
|
|
|
|
_, err := db.Exec("select 1")
|
|
if err != nil {
|
|
switch true {
|
|
case strings.Contains(err.Error(), "connect: connection refused"):
|
|
fallthrough
|
|
case strings.Contains(err.Error(), "no pg_hba.conf entry for host"):
|
|
fallthrough
|
|
case strings.Contains(err.Error(), "network unreachable"):
|
|
fallthrough
|
|
case strings.Contains(err.Error(), "reset"):
|
|
fallthrough
|
|
case strings.Contains(err.Error(), "i/o timeout"):
|
|
return false, err
|
|
}
|
|
return false, nil
|
|
}
|
|
return true, nil
|
|
}
|