rapid7/metasploit-framework

View on GitHub

Showing 7,361 of 22,177 total issues

Method run has 59 lines of code (exceeds 25 allowed). Consider refactoring.
Open

  def run
    res = send_request_cgi({
      'method' => 'GET',
      'uri' => '/',
      'authorization' => basic_auth(datastore['WS_USERNAME'], datastore['WS_PASSWORD'])
Severity: Major
Found in modules/auxiliary/dos/http/cable_haunt_websocket_dos.rb - About 2 hrs to fix

    Method run_host has 59 lines of code (exceeds 25 allowed). Consider refactoring.
    Open

      def run_host(ip)
        data = '<?xml version="1.0" encoding="utf-8" ?>'
        data << '<env:Envelope xmlns:xsd="http://www.w3.org/2001/XMLSchema" xmlns:env="http://schemas.xmlsoap.org/soap/envelope/" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance">'
        data << '<env:Body>'
        data << '<n1:SUSR_RFC_USER_INTERFACE xmlns:n1="urn:sap-com:document:sap:rfc:functions" env:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/">'
    Severity: Major
    Found in modules/auxiliary/scanner/sap/sap_soap_rfc_susr_rfc_user_interface.rb - About 2 hrs to fix

      Method run_host has 59 lines of code (exceeds 25 allowed). Consider refactoring.
      Open

        def run_host(ip)
          right_marker = Rex::Text.rand_text_alpha(5)
          left_marker = Rex::Text.rand_text_alpha(5)
          flag = Rex::Text.rand_text_alpha(5)
      
      
      Severity: Major
      Found in modules/auxiliary/scanner/http/joomla_gallerywd_sqli_scanner.rb - About 2 hrs to fix

        Method each_user_fromuser_pass has 59 lines of code (exceeds 25 allowed). Consider refactoring.
        Open

          def each_user_fromuser_pass(&block)
            # Class variables to track credential use (for threading)
            @@credentials_tried = {}
            @@credentials_skipped = {}
        
        
        Severity: Major
        Found in modules/auxiliary/scanner/rservices/rlogin_login.rb - About 2 hrs to fix

          Method is_vulnerable? has 59 lines of code (exceeds 25 allowed). Consider refactoring.
          Open

            def is_vulnerable?(ip)
              begin
                connect
                smb_login
                handle = dcerpc_handle(RPC_NETLOGON_UUID, '1.0','ncacn_np', ["\\netlogon"])
          Severity: Major
          Found in modules/auxiliary/scanner/smb/smb_uninit_cred.rb - About 2 hrs to fix

            Method createpdf has 59 lines of code (exceeds 25 allowed). Consider refactoring.
            Open

              def createpdf
                # Code below taken POC provided by CheckPoint Research
                pdf = ''
                pdf << "%PDF-1.7\n"
                pdf << "1 0 obj\n"
            Severity: Major
            Found in modules/auxiliary/fileformat/badpdf.rb - About 2 hrs to fix

              Method initialize has 59 lines of code (exceeds 25 allowed). Consider refactoring.
              Open

                def initialize(info = {})
                  super(merge_info(info,
                    'Name'          => 'Apple iOS Command Shell, Reverse TCP Inline',
                    'Description'   => 'Connect back to attacker and spawn a command shell',
                    'Author'        => 'hdm',
              Severity: Major
              Found in modules/payloads/singles/osx/armle/shell_reverse_tcp.rb - About 2 hrs to fix

                Method exploit has 59 lines of code (exceeds 25 allowed). Consider refactoring.
                Open

                  def exploit
                    if check != CheckCode::Appears
                      fail_with(Failure::NotVulnerable, 'Target is not vulnerable')
                    end
                
                
                Severity: Major
                Found in modules/exploits/unix/http/pihole_blocklist_exec.rb - About 2 hrs to fix

                  Method initialize has 59 lines of code (exceeds 25 allowed). Consider refactoring.
                  Open

                    def initialize(info = {})
                      super(
                        update_info(
                          info,
                          'Name' => 'SAP Solution Manager remote unauthorized OS commands execution',
                  Severity: Major
                  Found in modules/exploits/multi/sap/cve_2020_6207_solman_rs.rb - About 2 hrs to fix

                    Method initialize has 59 lines of code (exceeds 25 allowed). Consider refactoring.
                    Open

                      def initialize(info = {})
                        super(update_info(info,
                          'Name'        => 'HP SiteScope issueSiebelCmd Remote Code Execution',
                          'Description' => %q{
                            This module exploits a code execution flaw in HP SiteScope. The vulnerability exists in the
                    Severity: Major
                    Found in modules/exploits/multi/http/hp_sitescope_issuesiebelcmd.rb - About 2 hrs to fix

                      Method initialize has 59 lines of code (exceeds 25 allowed). Consider refactoring.
                      Open

                        def initialize(info = {})
                          super(update_info(info,
                            'Name'        => 'Apache Tomcat Manager Authenticated Upload Code Execution',
                            'Description' => %q{
                              This module can be used to execute a payload on Apache Tomcat servers that
                      Severity: Major
                      Found in modules/exploits/multi/http/tomcat_mgr_upload.rb - About 2 hrs to fix

                        Method exploit has 59 lines of code (exceeds 25 allowed). Consider refactoring.
                        Open

                          def exploit
                            vprint_status('Getting nonce')
                            res = send_request_cgi(
                              'uri' => normalize_uri(target_uri.path)
                            )
                        Severity: Major
                        Found in modules/exploits/multi/http/wp_dnd_mul_file_rce.rb - About 2 hrs to fix

                          Method initialize has 59 lines of code (exceeds 25 allowed). Consider refactoring.
                          Open

                            def initialize(info = {})
                              super(
                                update_info(
                                  info,
                                  'Name' => 'SPIP connect Parameter PHP Injection',
                          Severity: Major
                          Found in modules/exploits/multi/http/spip_connect_exec.rb - About 2 hrs to fix

                            Method initialize has 59 lines of code (exceeds 25 allowed). Consider refactoring.
                            Open

                              def initialize(info = {})
                                super(
                                  update_info(
                                    info,
                                    'Name' => 'Spring Cloud Function SpEL Injection',
                            Severity: Major
                            Found in modules/exploits/multi/http/spring_cloud_function_spel_injection.rb - About 2 hrs to fix

                              Method initialize has 59 lines of code (exceeds 25 allowed). Consider refactoring.
                              Open

                                def initialize(info = {})
                                  super(
                                    update_info(
                                      info,
                                      'Name' => 'Lucee Authenticated Scheduled Job Code Execution',
                              Severity: Major
                              Found in modules/exploits/multi/http/lucee_scheduled_job.rb - About 2 hrs to fix

                                Method initialize has 59 lines of code (exceeds 25 allowed). Consider refactoring.
                                Open

                                  def initialize(info = {})
                                    super(update_info(info,
                                      'Name'           => 'Apache Struts ParametersInterceptor Remote Code Execution',
                                      'Description'    => %q{
                                        This module exploits a remote command execution vulnerability in Apache Struts
                                Severity: Major
                                Found in modules/exploits/multi/http/struts_code_exec_parameters.rb - About 2 hrs to fix

                                  Method initialize has 59 lines of code (exceeds 25 allowed). Consider refactoring.
                                  Open

                                    def initialize(info = {})
                                      super(update_info(info,
                                        'Name'           => 'Apache Struts includeParams Remote Code Execution',
                                        'Description'    => %q{
                                            This module exploits a remote command execution vulnerability in Apache Struts
                                  Severity: Major
                                  Found in modules/exploits/multi/http/struts_include_params.rb - About 2 hrs to fix

                                    Method initialize has 59 lines of code (exceeds 25 allowed). Consider refactoring.
                                    Open

                                      def initialize(info = {})
                                        super(update_info(info,
                                          'Name'            => 'JBoss JMX Console Beanshell Deployer WAR Upload and Deployment',
                                          'Description'    => %q{
                                              This module can be used to install a WAR file payload on JBoss servers that have
                                    Severity: Major
                                    Found in modules/exploits/multi/http/jboss_bshdeployer.rb - About 2 hrs to fix

                                      Method initialize has 59 lines of code (exceeds 25 allowed). Consider refactoring.
                                      Open

                                        def initialize(info = {})
                                          super(update_info(info,
                                            'Name'           => 'Mozilla Suite/Firefox Navigator Object Code Execution',
                                            'Description'    => %q{
                                                This module exploits a code execution vulnerability in the Mozilla
                                      Severity: Major
                                      Found in modules/exploits/multi/browser/mozilla_navigatorjava.rb - About 2 hrs to fix

                                        Method initialize has 59 lines of code (exceeds 25 allowed). Consider refactoring.
                                        Open

                                          def initialize(info = {})
                                            super(
                                              update_info(info,
                                              'Name'          => 'Sun Java Calendar Deserialization Privilege Escalation',
                                              'Description'   => %q{
                                        Severity: Major
                                        Found in modules/exploits/multi/browser/java_calendar_deserialize.rb - About 2 hrs to fix
                                          Severity
                                          Category
                                          Status
                                          Source
                                          Language