- Metasploit >= 3
- SearchSploit
Note: searchsploit must be installed on /opt folder
Copy the db_exploit.rb
into the ~/.msf4/plugins
folder.
msf > load db_exploit
[*] Welcome to Searchsploit integration to Metasploit.
[*]
[*] DB_Exploit integration requires a Searchsploit.
[*] For additional commands use db_exploit_help.
[*]
[*] Successfully loaded plugin: DB-Exploit
msf > db_exploit_search <exploit name>
-------------------------------------------- -----------------------------------
Exploit Title | Path
| (/opt/exploit-database/platforms/)
-------------------------------------------- -----------------------------------
Grails PDF Plugin 0.6 - XML External Entity | java/webapps/41466.py
PictureTrails Photo Editor GE.exe 2.0.0 - ' | windows/dos/39518.txt
Ruby on Rails - Development Web Console (v2 | ruby/remote/39792.rb
Ruby on Rails - Dynamic Render File Upload | multiple/remote/40561.rb
Ruby on Rails - JSON Processor YAML Deseria | multiple/remote/24434.rb
Ruby on Rails - Known Secret Session Cookie | multiple/remote/27527.rb
Ruby on Rails - XML Processor YAML Deserial | multiple/remote/24019.rb
Ruby on Rails 1.2.3 To_JSON - Script Inject | linux/remote/30089.txt
Ruby on Rails 2.3.5 - 'protect_from_forgery | linux/remote/33402.txt
Ruby on Rails 3.0.5 - 'WEBrick::HTTPRequest | multiple/remote/35352.rb
Ruby on Rails 4.0.x/4.1.x/4.2.x (Web Consol | multiple/remote/41689.rb
Ruby on Rails ActionPack Inline ERB - Code | ruby/remote/40086.rb
-------------------------------------------- -----------------------------------
msf > db_exploit_import <exploit path>
[*] Exploit imported, relad Metasploit!