rapid7/metasploit-framework

View on GitHub

Showing 16,065 of 22,177 total issues

Avoid too many return statements within this method.
Open

      return Rex::Version.new(@glinet['firmware']) >= Rex::Version.new('4.0.0') && Rex::Version.new(@glinet['firmware']) < Rex::Version.new('4.5.0')
Severity: Major
Found in modules/exploits/linux/http/glinet_unauth_rce_cve_2023_50445.rb - About 30 mins to fix

    Avoid too many return statements within this method.
    Open

        return false
    Severity: Major
    Found in modules/exploits/linux/http/glinet_unauth_rce_cve_2023_50445.rb - About 30 mins to fix

      Avoid too many return statements within this method.
      Open

          return unless decrypted.pack('C*').downcase == 'function start-negotiate'
      Severity: Major
      Found in modules/exploits/linux/http/empire_skywalker.rb - About 30 mins to fix

        Avoid too many return statements within this method.
        Open

            return Exploit::CheckCode::Safe("#{peer} - Unexpected response, unable to determine version") if json_body['version'].nil?
        Severity: Major
        Found in modules/exploits/linux/http/kibana_upgrade_assistant_telemetry_rce.rb - About 30 mins to fix

          Avoid too many return statements within this method.
          Open

                return Exploit::CheckCode::Safe("#{peer} - Unexpected response, unable to determine version")
          Severity: Major
          Found in modules/exploits/linux/http/kibana_upgrade_assistant_telemetry_rce.rb - About 30 mins to fix

            Avoid too many return statements within this method.
            Open

                return nil if potential_targets.empty?
            Severity: Major
            Found in modules/exploits/linux/http/cacti_unauthenticated_cmd_injection.rb - About 30 mins to fix

              Avoid too many return statements within this method.
              Open

                    return Rex::Version.new(@glinet['firmware']) >= Rex::Version.new('4.0.0') && Rex::Version.new(@glinet['firmware']) <= Rex::Version.new('4.4.3')
              Severity: Major
              Found in modules/exploits/linux/http/glinet_unauth_rce_cve_2023_50445.rb - About 30 mins to fix

                Avoid too many return statements within this method.
                Open

                    return CheckCode::Safe
                Severity: Major
                Found in modules/exploits/linux/http/nagios_xi_mibs_authenticated_rce.rb - About 30 mins to fix

                  Avoid too many return statements within this method.
                  Open

                        return xml_doc_or_check_code unless success # in this case xml_doc_or_check_code is a CheckCode so we can return it directly
                  Severity: Major
                  Found in modules/exploits/linux/http/opennms_horizon_authenticated_rce.rb - About 30 mins to fix

                    Avoid too many return statements within this method.
                    Open

                                return [false, 'Failed to parse the users.xml file while attempting to deescalate privileges. Manual cleanup is required.']
                    Severity: Major
                    Found in modules/exploits/linux/http/opennms_horizon_authenticated_rce.rb - About 30 mins to fix

                      Avoid too many return statements within this method.
                      Open

                              return CheckCode::Appears("User #{username} has the required privileges for exploitation to work without privilege escalation.")
                      Severity: Major
                      Found in modules/exploits/linux/http/opennms_horizon_authenticated_rce.rb - About 30 mins to fix

                        Avoid too many return statements within this method.
                        Open

                            return CheckCode::Safe

                          Avoid too many return statements within this method.
                          Open

                                    return [true]
                          Severity: Major
                          Found in modules/exploits/linux/http/opennms_horizon_authenticated_rce.rb - About 30 mins to fix

                            Avoid too many return statements within this method.
                            Open

                                return [false, xml_doc_or_msg] unless success # this is only used for cleanup. for exploit this cannot happen
                            Severity: Major
                            Found in modules/exploits/linux/http/opennms_horizon_authenticated_rce.rb - About 30 mins to fix

                              Avoid too many return statements within this method.
                              Open

                                    return [true, "Successfully deescalated privileges by removing #{@role_to_add}"]
                              Severity: Major
                              Found in modules/exploits/linux/http/opennms_horizon_authenticated_rce.rb - About 30 mins to fix

                                Avoid too many return statements within this method.
                                Open

                                        return [false, 'Failed to deescalate privileges. Manual cleanup is required.']
                                Severity: Major
                                Found in modules/exploits/linux/http/opennms_horizon_authenticated_rce.rb - About 30 mins to fix

                                  Avoid too many return statements within this method.
                                  Open

                                          return deal_with_failure_by_mode(mode, "Failed to parse the users.xml file while attempting to #{deescalate ? 'deescalate' : 'escalate'} privileges: #{e}", 'unexpected_reply')
                                  Severity: Major
                                  Found in modules/exploits/linux/http/opennms_horizon_authenticated_rce.rb - About 30 mins to fix

                                    Avoid too many return statements within this method.
                                    Open

                                          return CheckCode::Detected("Exploitation requires privilege escalation, which is not possible for OpenNMS version #{version}.")
                                    Severity: Major
                                    Found in modules/exploits/linux/http/opennms_horizon_authenticated_rce.rb - About 30 mins to fix

                                      Avoid too many return statements within this method.
                                      Open

                                                return deal_with_failure_by_mode(mode, message, 'unexpected_reply')
                                      Severity: Major
                                      Found in modules/exploits/linux/http/opennms_horizon_authenticated_rce.rb - About 30 mins to fix

                                        Avoid too many return statements within this method.
                                        Open

                                              return CheckCode::Appears("User #{username} has #{@highest_priv} privileges. Exploitation is likely possible via privilege escalation to ROLE_FILESYSTEM_EDITOR.")
                                        Severity: Major
                                        Found in modules/exploits/linux/http/opennms_horizon_authenticated_rce.rb - About 30 mins to fix
                                          Severity
                                          Category
                                          Status
                                          Source
                                          Language