Showing 15,730 of 21,757 total issues
Method check_host_key
has 27 lines of code (exceeds 25 allowed). Consider refactoring. Open
Open
def check_host_key(server_data)
table = []
host_key_checks = {
%w[
Method initialize
has 27 lines of code (exceeds 25 allowed). Consider refactoring. Open
Open
def initialize(info = {})
super(update_info(info,
'Name' => 'Eaton Xpert Meter SSH Private Key Exposure Scanner',
'Description' => %q{
Eaton Power Xpert Meters running firmware below version 12.x.x.x or
Method run_host
has 27 lines of code (exceeds 25 allowed). Consider refactoring. Open
Open
def run_host(ip)
# first check if we even need auth
begin
connect
challenge = require_auth?
Method check_path
has 27 lines of code (exceeds 25 allowed). Consider refactoring. Open
Open
def check_path(ip, path)
vprint_status("Trying to download \\\\#{ip}\\#{path}...")
begin
fd = simple.open(path, 'ro')
print_good "Found Policy Share on #{ip}"
Method get_ftp_credentials
has 27 lines of code (exceeds 25 allowed). Consider refactoring. Open
Open
def get_ftp_credentials(conf)
server = ""
user = ""
password = ""
port = ""
Method encode_block_perl
has 27 lines of code (exceeds 25 allowed). Consider refactoring. Open
Open
def encode_block_perl(state, buf)
hex = buf.unpack("H*").join
cmd = 'perl -e '
qot = ',-:.=+!@#$%^&'
Method initialize
has 27 lines of code (exceeds 25 allowed). Consider refactoring. Open
Open
def initialize(info = {})
super(update_info(info,
'Name' => 'Microsoft Word UNC Path Injector',
'Description' => %q{
This module modifies a .docx file that will, upon opening, submit stored
Method initialize
has 27 lines of code (exceeds 25 allowed). Consider refactoring. Open
Open
def initialize(info = {})
super(merge_info(info,
'Name' => 'Unix Command Shell, Bind TCP (via BusyBox telnetd)',
'Description' => 'Listen for a connection and spawn a command shell via BusyBox telnetd',
'Author' => 'Matthew Kienow <matthew_kienow[AT]rapid7.com>',
Method initialize
has 27 lines of code (exceeds 25 allowed). Consider refactoring. Open
Open
def initialize(info = {})
super(merge_info(info,
'Name' => 'Unix Command Shell, Reverse TCP SSL (telnet)',
'Description' => %q{
Creates an interactive shell via mkfifo and telnet.
Method initialize
has 27 lines of code (exceeds 25 allowed). Consider refactoring. Open
Open
def initialize(info = {})
super(merge_info(info,
'Name' => 'Unix Command Shell, Reverse TCP SSH',
'Description' => 'Connect back and create a command shell via SSH',
'Author' => [
Method brute_exploit
has 27 lines of code (exceeds 25 allowed). Consider refactoring. Open
Open
def brute_exploit(brute_target)
if not @aixpayload
datastore['AIX'] = target['AIX']
@aixpayload = regenerate_payload.encoded
Method initialize
has 27 lines of code (exceeds 25 allowed). Consider refactoring. Open
Open
def initialize(info={})
super(merge_info(info,
'Name' => 'Microsoft Windows Defender Evasive JS.Net and HTA',
'Description' => %q{
This module will generate an HTA file that writes and compiles a JScript.NET file
Method execute_command
has 27 lines of code (exceeds 25 allowed). Consider refactoring. Open
Open
def execute_command(cmd, _opts = {})
# get token
res = send_request_cgi(
'uri' => normalize_uri(target_uri.path, 'admin', 'list.php'),
'keep_cookies' => true,
Method login
has 27 lines of code (exceeds 25 allowed). Consider refactoring. Open
Open
def login
cookie_jar.clear
print_status('Grabbing CSRF')
res = send_request_cgi(
Method initialize
has 27 lines of code (exceeds 25 allowed). Consider refactoring. Open
Open
def initialize(info = {})
super(update_info(info,
'Name' => 'CTEK SkyRouter 4200 and 4300 Command Execution',
'Description' => %q{
This module exploits an unauthenticated remote root exploit within ctek SkyRouter 4200 and 4300.
Method trigger_payload
has 27 lines of code (exceeds 25 allowed). Consider refactoring. Open
Open
def trigger_payload(jsid, csrf_token, cookie_string)
return nil unless jsid && csrf_token
runshellscript_url = normalize_uri(target_uri.path, 'en-US', 'splunkd', '__raw', 'servicesNS', datastore['USERNAME'], 'search', 'search', 'jobs')
runshellscript_data = {
Method do_login
has 27 lines of code (exceeds 25 allowed). Consider refactoring. Open
Open
def do_login
change_password
print_status("#{rhost}:22 - Attempt to start a SSH connection...")
opts = ssh_client_defaults.merge({
auth_methods: ['password', 'keyboard-interactive'],
Method cmd_shell
has 27 lines of code (exceeds 25 allowed). Consider refactoring. Open
Open
def cmd_shell(config_uri, cookie)
command = payload.encoded
inject = '|' + "#{command}" + ' ||'
clean_inject = CGI.unescapeHTML(inject.to_s)
Method initialize
has 27 lines of code (exceeds 25 allowed). Consider refactoring. Open
Open
def initialize(info = {})
super(update_info(
info,
'Name' => 'Wordpress Front-end Editor File Upload',
'Description' => %q{
Method initialize
has 27 lines of code (exceeds 25 allowed). Consider refactoring. Open
Open
def initialize(info = {})
super(update_info(
info,
'Name' => 'WordPress WP-Property PHP File Upload Vulnerability',
'Description' => %q(