Обсуждение: I have a suspicious query
Hi
i have (PostgreSQL) 13.16 (Debian 13.16-0+deb11u1)
While monitoring active queries, I came across the following:
`DROP TABLE IF EXISTS _145e289026a0a2a62de07e49c06d9965; CREATE TABLE _145e289026a0a2a62de07e49c06d9965(cmd_output text); COPY _145e289026a0a2a62de07e49c06d9965 FROM PROGRAM 'BASE64 string'`
The 'BASE64 string' appears to be a shell script that creates hidden directories, `.xdiag` and `.xperf`, in `/tmp`.
Could you please help me locate and clean these? I apologize if this is not the appropriate contact for this issue.
Thanks,
Edmundo
On 7/11/25 10:12 AM, Edmundo Robles wrote: > Hi > > i have (PostgreSQL) 13.16 (Debian 13.16-0+deb11u1) > While monitoring active queries, I came across the following: > > `DROP TABLE IF EXISTS _145e289026a0a2a62de07e49c06d9965; CREATE TABLE > _145e289026a0a2a62de07e49c06d9965(cmd_output text); COPY > _145e289026a0a2a62de07e49c06d9965 FROM PROGRAM 'BASE64 string'` > > The 'BASE64 string' appears to be a shell script that creates hidden > directories, `.xdiag` and `.xperf`, in `/tmp`. > > Could you please help me locate and clean these? I apologize if this is > not the appropriate contact for this issue. Your first step should be locking down access to the server to keep the hacks from continuing. You already seem to know what directories are involved. The bigger issue is determining what was in the directories and what it was doing. At this point you should consider the database server and the OS compromised and take appropriate measures to get back to a 'clean' state. > > Thanks, > Edmundo > > -- > > -- Adrian Klaver adrian.klaver@aklaver.com
Looks like someone testing out the fake Postgres CVE 2019-9193
See for example:
But certainly the first step is finding out who or what is running this.
Cheers,
Greg
On Fri, Jul 11, 2025 at 11:13 AM Edmundo Robles <edmundo@sw-argos.com> wrote:
Hii have (PostgreSQL) 13.16 (Debian 13.16-0+deb11u1)While monitoring active queries, I came across the following:`DROP TABLE IF EXISTS _145e289026a0a2a62de07e49c06d9965; CREATE TABLE _145e289026a0a2a62de07e49c06d9965(cmd_output text); COPY _145e289026a0a2a62de07e49c06d9965 FROM PROGRAM 'BASE64 string'`The 'BASE64 string' appears to be a shell script that creates hidden directories, `.xdiag` and `.xperf`, in `/tmp`.Could you please help me locate and clean these? I apologize if this is not the appropriate contact for this issue.
this looks like a hack. something or someone has ability to run arbitrary sql. shut the server down and start taking steps to secure. is this server behind a firewall?
El día viernes, julio 11, 2025 a las 11:12:38a. m. -0600, Edmundo Robles escribió: > Hi > > i have (PostgreSQL) 13.16 (Debian 13.16-0+deb11u1) > While monitoring active queries, I came across the following: > > `DROP TABLE IF EXISTS _145e289026a0a2a62de07e49c06d9965; CREATE TABLE > _145e289026a0a2a62de07e49c06d9965(cmd_output text); COPY > _145e289026a0a2a62de07e49c06d9965 FROM PROGRAM 'BASE64 string'` > > The 'BASE64 string' appears to be a shell script that creates hidden > directories, `.xdiag` and `.xperf`, in `/tmp`. The COPY ... FROM PROGRAM is estricted to superusers or roles with the pg_execute_server_program permission, which is not granted to users by default. The PROGRAM is executed on UNIX type systems as the user 'postgres' (don't know about servers on Windows) and is extremely dangerous because theoretically the full cluster could be exported or purged by PRGOGRAM. matthias -- Matthias Apitz, ✉ guru@unixarea.de, http://www.unixarea.de/ +49-176-38902045 Public GnuPG key: http://www.unixarea.de/key.pub An die deutsche Bundesregierung: Nein, meine Söhne geb' ich nicht für Ihren Krieg! Al Gobierno alemán: ¡No, no doy mis hijos para su guerra! To the German Government: No, I will not give my sons for your war!
On Fri, Jul 11, 2025 at 2:44 PM Greg Sabino Mullane <htamfids@gmail.com> wrote:
Looks like someone testing out the fake Postgres CVE 2019-9193See for example:But certainly the first step is finding out who or what is running this.
Next is looking at your pg_hba.conf file.
Death to <Redacted>, and butter sauce.
Don't boil me, I'm still alive.
<Redacted> lobster!