rapid7/metasploit-framework

View on GitHub

Showing 7,361 of 22,177 total issues

Method run_host has 57 lines of code (exceeds 25 allowed). Consider refactoring.
Open

  def run_host(ip)
    users_found = {}
    result = nil # temp for storing result of SMTP request
    code = 0     # status code parsed from result
    vrfy = true  # if vrfy allowed
Severity: Major
Found in modules/auxiliary/scanner/smtp/smtp_enum.rb - About 2 hrs to fix

    Method make_login has 57 lines of code (exceeds 25 allowed). Consider refactoring.
    Open

      def make_login(opts={})
    
        pkt = ""
        idx = 0
        db = ""
    Severity: Major
    Found in modules/auxiliary/fuzzers/tds/tds_login_corrupt.rb - About 2 hrs to fix

      Method generate has 57 lines of code (exceeds 25 allowed). Consider refactoring.
      Open

        def generate(opts={})
          payload = %Q^
            ; Creating the socket file descriptor
            ; int socket(int domain, int type, int protocol);
            ; socket(AF_INET, SOCK_STREAM, IPPROTO_IP)
      Severity: Major
      Found in modules/payloads/singles/linux/x64/shell_bind_tcp_random_port.rb - About 2 hrs to fix

        Method initialize has 57 lines of code (exceeds 25 allowed). Consider refactoring.
        Open

          def initialize(info = {})
            super(
              update_info(
                info,
                'Name' => 'Array Networks vAPV and vxAG Private Key Privilege Escalation Code Execution',
        Severity: Major
        Found in modules/exploits/unix/ssh/array_vxag_vapv_privkey_privesc.rb - About 2 hrs to fix

          Method exploit has 57 lines of code (exceeds 25 allowed). Consider refactoring.
          Open

            def exploit
              factory = ssh_socket_factory
          
              opts = {
                auth_methods: ['password', 'keyboard-interactive'],
          Severity: Major
          Found in modules/exploits/unix/ssh/arista_tacplus_shell.rb - About 2 hrs to fix

            Method initialize has 57 lines of code (exceeds 25 allowed). Consider refactoring.
            Open

              def initialize(info = {})
                super(
                  update_info(
                    info,
                    'Name' => 'ZoneMinder Snapshots Command Injection',
            Severity: Major
            Found in modules/exploits/unix/webapp/zoneminder_snapshots.rb - About 2 hrs to fix

              Method initialize has 57 lines of code (exceeds 25 allowed). Consider refactoring.
              Open

                def initialize(info={})
                  super(update_info(info,
                    'Name'           => "HP System Management Homepage JustGetSNMPQueue Command Injection",
                    'Description'    => %q{
                      This module exploits a vulnerability found in HP System Management Homepage.  By
              Severity: Major
              Found in modules/exploits/multi/http/hp_sys_mgmt_exec.rb - About 2 hrs to fix

                Method add_printer has 57 lines of code (exceeds 25 allowed). Consider refactoring.
                Open

                  def add_printer(printer_name, cmd)
                    vprint_status("Adding new printer '#{printer_name}'")
                
                    ppd_name = "#{rand_text_alphanumeric(10 + rand(5))}.ppd"
                    ppd_file = <<-EOF
                Severity: Major
                Found in modules/exploits/multi/http/cups_bash_env_exec.rb - About 2 hrs to fix

                  Method initialize has 57 lines of code (exceeds 25 allowed). Consider refactoring.
                  Open

                    def initialize(info = {})
                      super(
                        update_info(
                          info,
                          'Name' => 'Agent Tesla Panel Remote Code Execution',
                  Severity: Major
                  Found in modules/exploits/multi/http/agent_tesla_panel_rce.rb - About 2 hrs to fix

                    Method initialize has 57 lines of code (exceeds 25 allowed). Consider refactoring.
                    Open

                      def initialize(info = {})
                        super(
                          update_info(
                            info,
                            'Name' => 'Atlassian Confluence Widget Connector Macro Velocity Template Injection',
                    Severity: Major
                    Found in modules/exploits/multi/http/confluence_widget_connector.rb - About 2 hrs to fix

                      Method initialize has 57 lines of code (exceeds 25 allowed). Consider refactoring.
                      Open

                        def initialize(info = {})
                          super(
                            update_info(
                              info,
                              'Name' => 'DotCMS RCE via Arbitrary File Upload.',
                      Severity: Major
                      Found in modules/exploits/multi/http/dotcms_file_upload_rce.rb - About 2 hrs to fix

                        Method initialize has 57 lines of code (exceeds 25 allowed). Consider refactoring.
                        Open

                          def initialize(info = {})
                            super(
                              update_info(
                                info,
                                'Name' => 'Wordpress Popular Posts Authenticated RCE',
                        Severity: Major
                        Found in modules/exploits/multi/http/wp_popular_posts_rce.rb - About 2 hrs to fix

                          Method initialize has 57 lines of code (exceeds 25 allowed). Consider refactoring.
                          Open

                            def initialize(info = {})
                              super(
                                update_info(
                                  info,
                                  'Name' => 'SPIP form PHP Injection',
                          Severity: Major
                          Found in modules/exploits/multi/http/spip_rce_form.rb - About 2 hrs to fix

                            Method initialize has 57 lines of code (exceeds 25 allowed). Consider refactoring.
                            Open

                              def initialize( info = {} )
                            
                                super( update_info( info,
                                  'Name'          => 'Java Applet Driver Manager Privileged toString() Remote Code Execution',
                                  'Description'   => %q{
                            Severity: Major
                            Found in modules/exploits/multi/browser/java_jre17_driver_manager.rb - About 2 hrs to fix

                              Method initialize has 57 lines of code (exceeds 25 allowed). Consider refactoring.
                              Open

                                def initialize(info = {})
                                  super(
                                    update_info(
                                      info,
                                      'Name' => 'Google Chrome 67, 68 and 69 Object.create exploit',
                              Severity: Major
                              Found in modules/exploits/multi/browser/chrome_object_create.rb - About 2 hrs to fix

                                Method exploit has 57 lines of code (exceeds 25 allowed). Consider refactoring.
                                Open

                                  def exploit
                                    print_status('Generating payload...')
                                    case target.name
                                    when 'Windows'
                                      string0_cmd = 'cmd.exe'

                                  Method initialize has 57 lines of code (exceeds 25 allowed). Consider refactoring.
                                  Open

                                    def initialize(info = {})
                                      super(update_info(info,
                                        'Name'           => 'LibreOffice Macro Code Execution',
                                        'Description'    => %q{
                                          LibreOffice comes bundled with sample macros written in Python and
                                  Severity: Major
                                  Found in modules/exploits/multi/fileformat/libreoffice_macro_exec.rb - About 2 hrs to fix

                                    Method exploit has 57 lines of code (exceeds 25 allowed). Consider refactoring.
                                    Open

                                      def exploit
                                        check_pcaprub_loaded # Check first
                                    
                                        ret_offset = target['RetOff']
                                    
                                    
                                    Severity: Major
                                    Found in modules/exploits/multi/misc/wireshark_lwres_getaddrbyname.rb - About 2 hrs to fix

                                      Method initialize has 57 lines of code (exceeds 25 allowed). Consider refactoring.
                                      Open

                                        def initialize(info = {})
                                          super(update_info(info,
                                            'Name'           => 'Solaris xscreensaver log Privilege Escalation',
                                            'Description'    => %q{
                                              This module exploits a vulnerability in `xscreensaver` versions
                                      Severity: Major
                                      Found in modules/exploits/solaris/local/xscreensaver_log_priv_esc.rb - About 2 hrs to fix

                                        Method exploit has 57 lines of code (exceeds 25 allowed). Consider refactoring.
                                        Open

                                          def exploit
                                            def infect(apkfile)
                                              unless apkfile.start_with?("package:")
                                                fail_with Failure::BadConfig, 'Unable to locate app apk'
                                              end
                                        Severity: Major
                                        Found in modules/exploits/android/local/janus.rb - About 2 hrs to fix
                                          Severity
                                          Category
                                          Status
                                          Source
                                          Language