Skip to content

Commit 2116cea

Browse files
author
jenkins-metasploit
committed
automatic module_metadata_base.json update
1 parent 0b4e133 commit 2116cea

File tree

1 file changed

+57
-0
lines changed

1 file changed

+57
-0
lines changed

db/modules_metadata_base.json

Lines changed: 57 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -99503,6 +99503,63 @@
9950399503
"session_types": false,
9950499504
"needs_cleanup": null
9950599505
},
99506+
"exploit_multi/http/pgadmin_query_tool_authenticated": {
99507+
"name": "pgAdmin Query Tool authenticated RCE (CVE-2025-2945)",
99508+
"fullname": "exploit/multi/http/pgadmin_query_tool_authenticated",
99509+
"aliases": [],
99510+
"rank": 600,
99511+
"disclosure_date": "2025-04-03",
99512+
"type": "exploit",
99513+
"author": [
99514+
"pyozzi-toss",
99515+
"jheysel-r7"
99516+
],
99517+
"description": "This module exploits a vulnerability in pgAdmin where an authenticated user can establish a connection to the query tool\n and send a specific payload in the query_commited POST parameter. This payload is directly executed via a Python eval()\n statement, resulting in remote code execution in versions prior to 9.2.\n\n To exploit this vulnerability, pgAdmin credentials are required. Additionally, in order to interact with the vulnerable\n SQL editor component, valid database credentials are necessary to initialize a session and obtain a transaction ID,\n which is required for the exploit.",
99518+
"references": [
99519+
"CVE-2025-2945"
99520+
],
99521+
"platform": "Python",
99522+
"arch": "python",
99523+
"rport": 80,
99524+
"autofilter_ports": [
99525+
80,
99526+
8080,
99527+
443,
99528+
8000,
99529+
8888,
99530+
8880,
99531+
8008,
99532+
3000,
99533+
8443
99534+
],
99535+
"autofilter_services": [
99536+
"http",
99537+
"https"
99538+
],
99539+
"targets": [
99540+
"Python payload"
99541+
],
99542+
"mod_time": "2025-04-10 10:53:05 +0000",
99543+
"path": "/modules/exploits/multi/http/pgadmin_query_tool_authenticated.rb",
99544+
"is_install_path": true,
99545+
"ref_name": "multi/http/pgadmin_query_tool_authenticated",
99546+
"check": true,
99547+
"post_auth": true,
99548+
"default_credential": false,
99549+
"notes": {
99550+
"Stability": [
99551+
"crash-safe"
99552+
],
99553+
"Reliability": [
99554+
"repeatable-session"
99555+
],
99556+
"SideEffects": [
99557+
"ioc-in-logs"
99558+
]
99559+
},
99560+
"session_types": false,
99561+
"needs_cleanup": null
99562+
},
9950699563
"exploit_multi/http/pgadmin_session_deserialization": {
9950799564
"name": "pgAdmin Session Deserialization RCE",
9950899565
"fullname": "exploit/multi/http/pgadmin_session_deserialization",

0 commit comments

Comments
 (0)