rapid7/metasploit-framework

View on GitHub

Showing 4,113 of 21,757 total issues

File vcenter_secrets_dump.rb has 798 lines of code (exceeds 250 allowed). Consider refactoring.
Open

require 'metasploit/framework/credential_collection'

class MetasploitModule < Msf::Post
  include Msf::Post::Common
  include Msf::Post::File
Severity: Major
Found in modules/post/linux/gather/vcenter_secrets_dump.rb - About 1 day to fix

    File base.rb has 788 lines of code (exceeds 250 allowed). Consider refactoring.
    Open

    class Msf::Exploit::Remote::Kerberos::ServiceAuthenticator::Base
      extend Forwardable
      include Msf::Exploit::Remote::Kerberos::Client
      include Msf::Auxiliary::Report
      include Rex::Proto::Gss::Asn1
    Severity: Major
    Found in lib/msf/core/exploit/remote/kerberos/service_authenticator/base.rb - About 1 day to fix

      File exploit.rb has 785 lines of code (exceeds 250 allowed). Consider refactoring.
      Open

      module Msf
      
      
      
      ###
      Severity: Major
      Found in lib/msf/core/exploit.rb - About 1 day to fix

        Method cmd_sessions has 361 lines of code (exceeds 25 allowed). Consider refactoring.
        Open

          def cmd_sessions(*args)
            begin
            method   = nil
            quiet    = false
            show_active = false
        Severity: Major
        Found in lib/msf/ui/console/command_dispatcher/core.rb - About 1 day to fix

          File browser_autopwn.rb has 756 lines of code (exceeds 250 allowed). Consider refactoring.
          Open

          require 'rex/exploitation/js/detect'
          require 'rex/exploitation/jsobfu'
          
          class MetasploitModule < Msf::Auxiliary
            include Msf::Exploit::Remote::HttpServer::HTML
          Severity: Major
          Found in modules/auxiliary/server/browser_autopwn.rb - About 1 day to fix

            File file.rb has 755 lines of code (exceeds 250 allowed). Consider refactoring.
            Open

            require 'rex/post/meterpreter/extensions/stdapi/command_ids'
            require 'rex/post/file_stat'
            
            module Msf::Post::File
              include Msf::Post::Common
            Severity: Major
            Found in lib/msf/core/post/file.rb - About 1 day to fix

              File snmp_enum.rb has 749 lines of code (exceeds 250 allowed). Consider refactoring.
              Open

              class MetasploitModule < Msf::Auxiliary
                include Msf::Exploit::Remote::SNMPClient
                include Msf::Auxiliary::Report
                include Msf::Auxiliary::Scanner
              
              
              Severity: Major
              Found in modules/auxiliary/scanner/snmp/snmp_enum.rb - About 1 day to fix

                File mssql_enum.rb has 734 lines of code (exceeds 250 allowed). Consider refactoring.
                Open

                class MetasploitModule < Msf::Auxiliary
                  include Msf::Exploit::Remote::MSSQL
                  include Msf::Auxiliary::Report
                  include Msf::OptionalSession::MSSQL
                
                
                Severity: Major
                Found in modules/auxiliary/admin/mssql/mssql_enum.rb - About 1 day to fix

                  Method sql_statement has 340 lines of code (exceeds 25 allowed). Consider refactoring.
                  Open

                    def sql_statement()
                  
                      # DEFINED HEADER TEXT
                      headings = [
                        ["Server","Database", "Schema", "Table", "Column", "Data Type", "Sample Data","Row Count"]
                  Severity: Major
                  Found in modules/auxiliary/admin/mssql/mssql_findandsampledata.rb - About 1 day to fix

                    File ssllabs_scan.rb has 732 lines of code (exceeds 250 allowed). Consider refactoring.
                    Open

                    require 'active_support/inflector'
                    require 'json'
                    require 'active_support/core_ext/hash'
                    
                    class MetasploitModule < Msf::Auxiliary
                    Severity: Major
                    Found in modules/auxiliary/gather/ssllabs_scan.rb - About 1 day to fix

                      File readable_text.rb has 731 lines of code (exceeds 250 allowed). Consider refactoring.
                      Open

                      module Msf
                      module Serializer
                      
                      # This class formats information in a plain-text format that
                      # is meant to be displayed on a console or some other non-GUI
                      Severity: Major
                      Found in lib/msf/base/serializer/readable_text.rb - About 1 day to fix

                        File weblogic_deserialize_badattrval.rb has 728 lines of code (exceeds 250 allowed). Consider refactoring.
                        Open

                        class MetasploitModule < Msf::Exploit::Remote
                          Rank = NormalRanking
                        
                          include Msf::Exploit::Remote::Tcp
                          include Msf::Exploit::CmdStager
                        Severity: Major
                        Found in modules/exploits/multi/misc/weblogic_deserialize_badattrval.rb - About 1 day to fix

                          File veeam_credential_dump.rb has 724 lines of code (exceeds 250 allowed). Consider refactoring.
                          Open

                          require 'metasploit/framework/credential_collection'
                          
                          class MetasploitModule < Msf::Post
                            include Msf::Post::Common
                            include Msf::Post::File
                          Severity: Major
                          Found in modules/post/windows/gather/credentials/veeam_credential_dump.rb - About 1 day to fix

                            Method on_request_uri has 334 lines of code (exceeds 25 allowed). Consider refactoring.
                            Open

                              def on_request_uri(cli, request)
                                print_status("Sending #{request.uri}")
                                if request.uri =~ %r{/exploit.html$}
                                  html = %Q^
                            <html>
                            Severity: Major
                            Found in modules/exploits/windows/browser/chrome_filereader_uaf.rb - About 1 day to fix

                              Class Core has 88 methods (exceeds 20 allowed). Consider refactoring.
                              Open

                              class Core
                              
                                include Msf::Ui::Console::CommandDispatcher
                                include Msf::Ui::Console::CommandDispatcher::Common
                                include Msf::Ui::Console::ModuleOptionTabCompletion
                              Severity: Major
                              Found in lib/msf/ui/console/command_dispatcher/core.rb - About 1 day to fix

                                File java_jdwp_debugger.rb has 718 lines of code (exceeds 250 allowed). Consider refactoring.
                                Open

                                class MetasploitModule < Msf::Exploit::Remote
                                  Rank = GoodRanking
                                
                                  include Msf::Exploit::Remote::Tcp
                                  include Msf::Exploit::EXE
                                Severity: Major
                                Found in modules/exploits/multi/misc/java_jdwp_debugger.rb - About 1 day to fix

                                  Method exploit has 329 lines of code (exceeds 25 allowed). Consider refactoring.
                                  Open

                                    def exploit
                                      if target.name =~ /prestashop/
                                        uri = normalize_uri(target_uri.path)
                                        res = send_request_cgi({'uri' => uri})
                                        if res && res.code != 301
                                  Severity: Major
                                  Found in modules/exploits/linux/http/php_imap_open_rce.rb - About 1 day to fix

                                    Method exploit has 326 lines of code (exceeds 25 allowed). Consider refactoring.
                                    Open

                                      def exploit
                                        if is_root?
                                          fail_with Failure::BadConfig, 'Session already has root privileges'
                                        end
                                    
                                    
                                    Severity: Major
                                    Found in modules/exploits/solaris/local/rsh_stack_clash_priv_esc.rb - About 1 day to fix

                                      Method cisco_ios_config_eater has 324 lines of code (exceeds 25 allowed). Consider refactoring.
                                      Open

                                          def cisco_ios_config_eater(thost, tport, config)
                                      
                                            if framework.db.active
                                              credential_data = {
                                                address: thost,
                                      Severity: Major
                                      Found in lib/msf/core/auxiliary/cisco.rb - About 1 day to fix

                                        Method on_request_uri has 323 lines of code (exceeds 25 allowed). Consider refactoring.
                                        Open

                                          def on_request_uri(cli, request)
                                            user_agent = request['User-Agent']
                                            print_status("Request from #{user_agent}")
                                            offsets = get_offsets(user_agent)
                                            unless offsets
                                        Severity: Major
                                        Found in modules/exploits/osx/browser/safari_proxy_object_type_confusion.rb - About 1 day to fix
                                          Severity
                                          Category
                                          Status
                                          Source
                                          Language