Merge pull request #65 from g0tmi1k/searchsploit

Fix for #64
This commit is contained in:
g0tmi1k 2016-12-08 20:36:52 +00:00 committed by GitHub
commit f8d598fca8
2 changed files with 8 additions and 7 deletions

View file

@ -56,12 +56,13 @@ root@kali:~# searchsploit afd windows local
Exploit Title | Path Exploit Title | Path
| (/usr/share/exploitdb/platforms) | (/usr/share/exploitdb/platforms)
--------------------------------------------------------------------------------- ---------------------------------- --------------------------------------------------------------------------------- ----------------------------------
Microsoft Windows 2003/XP - 'afd.sys' Privilege Escalation (K-plugin) | ./windows/local/6757.txt
Microsoft Windows XP - 'afd.sys' Local Kernel Denial of Service | ./windows/dos/17133.c Microsoft Windows XP - 'afd.sys' Local Kernel Denial of Service | ./windows/dos/17133.c
Microsoft Windows 2003/XP - 'afd.sys' Privilege Escalation (K-plugin) (MS08-066) | ./windows/local/6757.txt
Microsoft Windows XP/2003 - 'afd.sys' Privilege Escalation (MS11-080) | ./windows/local/18176.py Microsoft Windows XP/2003 - 'afd.sys' Privilege Escalation (MS11-080) | ./windows/local/18176.py
Microsoft Windows - 'AfdJoinLeaf' Privilege Escalation (MS11-080) | ./windows/local/21844.rb Microsoft Windows - 'AfdJoinLeaf' Privilege Escalation (MS11-080) (Metasploit) | ./windows/local/21844.rb
Microsoft Windows - 'afd.sys' Dangling Pointer Privilege Escalation (MS14-040) | ./win_x86/local/39446.py Microsoft Windows - 'afd.sys' Dangling Pointer Privilege Escalation (MS14-040) | ./win_x86/local/39446.py
Microsoft Windows 7 (x64) - 'afd.sys' Privilege Escalation (MS14-040) | ./win_x86-64/local/39525.py Microsoft Windows 7 (x64) - 'afd.sys' Privilege Escalation (MS14-040) | ./win_x86-64/local/39525.py
Microsoft Windows (x86) - 'afd.sys' Privilege Escalation (MS11-046) | ./windows/local/40564.c
--------------------------------------------------------------------------------- ---------------------------------- --------------------------------------------------------------------------------- ----------------------------------
root@kali:~# root@kali:~#
root@kali:~# searchsploit -p 39446 root@kali:~# searchsploit -p 39446
@ -70,6 +71,7 @@ Exploit: Microsoft Windows - 'afd.sys' Dangling Pointer Privilege Escalation (MS
Path: /usr/share/exploitdb/platforms/win_x86/local/39446.py Path: /usr/share/exploitdb/platforms/win_x86/local/39446.py
Copied EDB-ID 39446's path to the clipboard. Copied EDB-ID 39446's path to the clipboard.
root@kali:~# root@kali:~#
``` ```

View file

@ -1,7 +1,7 @@
#!/bin/bash #!/bin/bash
# Name: SearchSploit - Exploit-DB's CLI search tool # Name: SearchSploit - Exploit-DB's CLI search tool
# Version: 3.7.1 (Release date: 2016-11-07) # Version: 3.7.2 (Release date: 2016-12-08)
# Written by: Offensive Security, Unix-Ninja & g0tmi1k # Written by: Offensive Security, Unix-Ninja, and g0tmi1k
# Homepage: https://github.com/offensive-security/exploit-database # Homepage: https://github.com/offensive-security/exploit-database
# #
## NOTE: ## NOTE:
@ -350,7 +350,6 @@ function buildterms()
} }
## Check for empty args ## Check for empty args
if [[ $# -eq 0 ]]; then if [[ $# -eq 0 ]]; then
usage >&2 usage >&2
@ -517,8 +516,8 @@ if [[ "${GETPATH}" -eq 1 ]]; then
fi fi
if [[ "${MIRROR}" -eq 1 ]]; then if [[ "${MIRROR}" -eq 1 ]]; then
echo "Copied to '$(pwd)/'"
cp -i "${location}" "$(pwd)/" cp -i "${location}" "$(pwd)/"
echo "Copied to '$(pwd)/'"
echo -e "\n" echo -e "\n"
fi fi
else else
@ -628,7 +627,7 @@ elif [[ "${EDBID}" -eq 1 ]]; then
## Print JSON format (full options) ("--json")? ## Print JSON format (full options) ("--json")?
elif [[ "${JSON}" -eq 1 ]]; then elif [[ "${JSON}" -eq 1 ]]; then
OUTPUT="$( eval ${SEARCH} \ OUTPUT="$( eval ${SEARCH} \
| awk -F "\"*,\"*" '{ printf "\r\t\t'{'\"Exploit\":\"%s\",\"Path\":\"'${gitpath}/'%s\",\"EDB-ID\":%s},\n", $3, $2, $1 }' \ | awk -F "\"*,\"*" '{ printf "\r\t\t'{'\"Exploit\":\"%s,\"Path\":\"'${gitpath}/'%s\",\"EDB-ID\":%s},\n", $3, $2, $1 }' \
| sed '$ s/,$//g' )" | sed '$ s/,$//g' )"
## Default view ## Default view
else else