rapid7/metasploit-framework

View on GitHub

Showing 15,730 of 21,757 total issues

Method initialize has 27 lines of code (exceeds 25 allowed). Consider refactoring.
Open

  def initialize(info = {})
    super(update_info(info,
      'Name'           => 'HTTP Interesting File Scanner',
      'Description'    => %q{
        This module identifies the existence of interesting files
Severity: Minor
Found in modules/auxiliary/scanner/http/files_dir.rb - About 1 hr to fix

    Method initialize has 27 lines of code (exceeds 25 allowed). Consider refactoring.
    Open

      def initialize
        super(
          'Name'           => 'Barracuda Multiple Product "locale" Directory Traversal',
          'Description'    => %q{
              This module exploits a directory traversal vulnerability present in
    Severity: Minor
    Found in modules/auxiliary/scanner/http/barracuda_directory_traversal.rb - About 1 hr to fix

      Method initialize has 27 lines of code (exceeds 25 allowed). Consider refactoring.
      Open

        def initialize(info = {})
          super(
            update_info(
              info,
              'Name' => 'WordPress WPS Hide Login Login Page Revealer',
      Severity: Minor
      Found in modules/auxiliary/scanner/http/wp_wps_hide_login_revealer.rb - About 1 hr to fix

        Method initialize has 27 lines of code (exceeds 25 allowed). Consider refactoring.
        Open

          def initialize(info = {})
            super(update_info(info,
              'Name'        => 'Path Traversal in Oracle GlassFish Server Open Source Edition',
              'Description' => %q{
                This module exploits an unauthenticated directory traversal vulnerability
        Severity: Minor
        Found in modules/auxiliary/scanner/http/glassfish_traversal.rb - About 1 hr to fix

          Method initialize has 27 lines of code (exceeds 25 allowed). Consider refactoring.
          Open

            def initialize(info = {})
              super(update_info(info,
                'Name'           => 'URGENT/11 Scanner, Based on Detection Tool by Armis',
                'Description'    => %q{
                  This module detects VxWorks and the IPnet IP stack, along with devices
          Severity: Minor
          Found in modules/auxiliary/scanner/vxworks/urgent11_check.rb - About 1 hr to fix

            Method initialize has 27 lines of code (exceeds 25 allowed). Consider refactoring.
            Open

              def initialize(info = {})
                super(update_info(info,
                  'Name'           => 'ManageEngine DeviceExpert 5.6 ScheduleResultViewer FileName Traversal',
                  'Description'    => %q{
                      This module exploits a directory traversal vulnerability found in ManageEngine

              Method run_host has 27 lines of code (exceeds 25 allowed). Consider refactoring.
              Open

                def run_host(ip)
                  trav = "...\\...\\...\\...\\...\\...\\"
              
                  # In case the user doesn't realize he doesn't need to begin with "\",
                  # we'll correct that for him
              Severity: Minor
              Found in modules/auxiliary/scanner/http/netdecision_traversal.rb - About 1 hr to fix

                Method check_app has 27 lines of code (exceeds 25 allowed). Consider refactoring.
                Open

                  def check_app(app)
                    res = send_request_cgi({
                      'uri'       => app,
                      'method'    => 'GET',
                      'ctype'     => 'text/plain'
                Severity: Minor
                Found in modules/auxiliary/scanner/http/jboss_vulnscan.rb - About 1 hr to fix

                  Method run has 27 lines of code (exceeds 25 allowed). Consider refactoring.
                  Open

                    def run
                      @base_stations = {}
                  
                      print_status("Opening interface: #{datastore['INTERFACE']}")
                      print_status("Using band: #{datastore['BAND']}")
                  Severity: Minor
                  Found in modules/auxiliary/scanner/dect/station_scanner.rb - About 1 hr to fix

                    Method dump_hashes has 27 lines of code (exceeds 25 allowed). Consider refactoring.
                    Open

                      def dump_hashes(host, port)
                    
                        # Grabs the username and password hashes and stores them as loot
                        res = mysql_query("SELECT user,password from mysql.user")
                        if res.nil?
                    Severity: Minor
                    Found in modules/auxiliary/scanner/mysql/mysql_authbypass_hashdump.rb - About 1 hr to fix

                      Method get_server_hello has 27 lines of code (exceeds 25 allowed). Consider refactoring.
                      Open

                        def get_server_hello
                          server_done = nil
                          ssl_record_counter = 0
                      
                          remaining_data = get_ssl_record
                      Severity: Minor
                      Found in modules/auxiliary/scanner/ssl/openssl_heartbleed.rb - About 1 hr to fix

                        Method initialize has 27 lines of code (exceeds 25 allowed). Consider refactoring.
                        Open

                          def initialize
                            super(
                              'Name'           => 'Cisco DLSw Information Disclosure Scanner',
                              'Description'    => %q(
                                This module implements the DLSw information disclosure retrieval. There
                        Severity: Minor
                        Found in modules/auxiliary/scanner/dlsw/dlsw_leak_capture.rb - About 1 hr to fix

                          Method check_host has 27 lines of code (exceeds 25 allowed). Consider refactoring.
                          Open

                            def check_host(_ip)
                              # The check command will call this method instead of run_host
                              status = Exploit::CheckCode::Unknown
                          
                              begin
                          Severity: Minor
                          Found in modules/auxiliary/scanner/rdp/cve_2019_0708_bluekeep.rb - About 1 hr to fix

                            Method initialize has 27 lines of code (exceeds 25 allowed). Consider refactoring.
                            Open

                              def initialize
                                super(
                                  'Name'        => 'Oracle iSQL*Plus Login Utility',
                                  'Description' => %q{
                                    This module attempts to authenticate against an Oracle ISQL*Plus
                            Severity: Minor
                            Found in modules/auxiliary/scanner/oracle/isqlplus_login.rb - About 1 hr to fix

                              Method run_host has 27 lines of code (exceeds 25 allowed). Consider refactoring.
                              Open

                                def run_host(ip)
                                  ssh_opts = ssh_client_defaults.merge({
                                    :port            => rport,
                                    :auth_methods    => ['password', 'keyboard-interactive'],
                                    :password        => %q{<<< %s(un='%s') = %u},
                              Severity: Minor
                              Found in modules/auxiliary/scanner/ssh/juniper_backdoor.rb - About 1 hr to fix

                                Method initialize has 27 lines of code (exceeds 25 allowed). Consider refactoring.
                                Open

                                  def initialize(info = {})
                                    super(update_info(info,
                                      'Name'           => 'Novell ZENworks Configuration Management Preboot Service Remote File Access',
                                      'Description'    => %q{
                                          This module exploits a directory traversal in the ZENworks Configuration Management.
                                Severity: Minor
                                Found in modules/auxiliary/scanner/misc/zenworks_preboot_fileaccess.rb - About 1 hr to fix

                                  Method initialize has 27 lines of code (exceeds 25 allowed). Consider refactoring.
                                  Open

                                    def initialize(info = {})
                                      super(
                                        update_info(
                                          info,
                                          'Name'          => 'Test SSH Github Access',
                                  Severity: Minor
                                  Found in modules/auxiliary/scanner/ssh/ssh_enum_git_keys.rb - About 1 hr to fix

                                    Method fingerprint_vmware has 27 lines of code (exceeds 25 allowed). Consider refactoring.
                                    Open

                                      def fingerprint_vmware(ip,res)
                                        unless res
                                          vprint_error("http://#{ip}:#{rport} - No response")
                                          return false
                                        end
                                    Severity: Minor
                                    Found in modules/auxiliary/scanner/vmware/esx_fingerprint.rb - About 1 hr to fix

                                      Method initialize has 27 lines of code (exceeds 25 allowed). Consider refactoring.
                                      Open

                                        def initialize(info = {})
                                          super(
                                            update_info(
                                              info,
                                              'Name' => 'Kerberos Authentication Check Scanner',
                                      Severity: Minor
                                      Found in modules/auxiliary/scanner/kerberos/kerberos_login.rb - About 1 hr to fix

                                        Method initialize has 27 lines of code (exceeds 25 allowed). Consider refactoring.
                                        Open

                                          def initialize(info={})
                                            super(update_info(info,
                                              'Name'           => "VMWare Update Manager 4 Directory Traversal",
                                              'Description'    => %q{
                                                This modules exploits a directory traversal vulnerability in VMWare Update Manager
                                        Severity: Minor
                                        Found in modules/auxiliary/scanner/vmware/vmware_update_manager_traversal.rb - About 1 hr to fix
                                          Severity
                                          Category
                                          Status
                                          Source
                                          Language