rapid7/metasploit-framework

View on GitHub

Showing 7,361 of 22,177 total issues

Method run_host has 56 lines of code (exceeds 25 allowed). Consider refactoring.
Open

  def run_host(ip)

    #
    # Using the InterBase Services Manager
    # http://dn.codegear.com/article/27002
Severity: Major
Found in modules/auxiliary/scanner/misc/ib_service_mgr_info.rb - About 2 hrs to fix

    Method run_host has 56 lines of code (exceeds 25 allowed). Consider refactoring.
    Open

      def run_host(ip)
        @org_rport = datastore['RPORT']
        datastore['RPORT'] = datastore['SNMPPORT']
    
        index_page = "index_ad.htm"
    Severity: Major
    Found in modules/auxiliary/scanner/misc/oki_scanner.rb - About 2 hrs to fix

      Method run_host has 56 lines of code (exceeds 25 allowed). Consider refactoring.
      Open

        def run_host(ip)
          @ip = ip
          print_status("Attempting login to #{ip}:#{rport}...")
      
          cred_collection = build_credential_collection(
      Severity: Major
      Found in modules/auxiliary/scanner/ssh/karaf_login.rb - About 2 hrs to fix

        Method process_phase has 56 lines of code (exceeds 25 allowed). Consider refactoring.
        Open

          def process_phase(phase_num, phase_name, prepend = '', initial_cmds = [])
            print_status("[Phase #{phase_num}] #{phase_name} - #{Time.now.localtime}")
            ecount = 1
            @evilchars.each do |evilstr|
        
        
        Severity: Major
        Found in modules/auxiliary/fuzzers/ftp/ftp_pre_post.rb - About 2 hrs to fix

          Method command_string has 56 lines of code (exceeds 25 allowed). Consider refactoring.
          Open

            def command_string
              lhost = datastore['LHOST']
              lport = datastore['LPORT']
              powershell = %Q^
          $a='#{lhost}';
          Severity: Major
          Found in modules/payloads/singles/cmd/windows/reverse_powershell.rb - About 2 hrs to fix

            Method run has 56 lines of code (exceeds 25 allowed). Consider refactoring.
            Open

              def run
                case target.arch.first
                when ARCH_X64
                  arch_suffix = 'x64'
                when ARCH_X86
            Severity: Major
            Found in modules/evasion/windows/process_herpaderping.rb - About 2 hrs to fix

              Method initialize has 56 lines of code (exceeds 25 allowed). Consider refactoring.
              Open

                def initialize(info = {})
                  super(
                    update_info(
                      info,
                      'Name'            => 'Polycom Command Shell Authorization Bypass',
              Severity: Major
              Found in modules/exploits/unix/misc/polycom_hdx_auth_bypass.rb - About 2 hrs to fix

                Method initialize has 56 lines of code (exceeds 25 allowed). Consider refactoring.
                Open

                  def initialize(info = {})
                    super(update_info(info,
                      'Name'           => 'Mail.app Image Attachment Command Execution',
                      'Description'    => %q{
                          This module exploits a command execution vulnerability in the
                Severity: Major
                Found in modules/exploits/osx/email/mailapp_image_exec.rb - About 2 hrs to fix

                  Method initialize has 56 lines of code (exceeds 25 allowed). Consider refactoring.
                  Open

                    def initialize(info = {})
                      super(update_info(info,
                        'Name'           => 'Cisco Data Center Network Manager Unauthenticated Remote Code Execution',
                        'Description'    => %q{
                          DCNM exposes a file upload servlet (FileUploadServlet) at /fm/fileUpload.
                  Severity: Major
                  Found in modules/exploits/multi/http/cisco_dcnm_upload_2019.rb - About 2 hrs to fix

                    Method initialize has 56 lines of code (exceeds 25 allowed). Consider refactoring.
                    Open

                      def initialize(info = {})
                        super(
                          update_info(
                            info,
                            'Name' => 'Apache Shiro v1.2.4 Cookie RememberME Deserial RCE',
                    Severity: Major
                    Found in modules/exploits/multi/http/shiro_rememberme_v124_deserialize.rb - About 2 hrs to fix

                      Method exploit has 56 lines of code (exceeds 25 allowed). Consider refactoring.
                      Open

                        def exploit
                          init = send_request_cgi({
                            'method' => 'GET',
                            'uri' => normalize_uri(target_uri.path, '/')
                          })
                      Severity: Major
                      Found in modules/exploits/multi/http/nas4free_php_exec.rb - About 2 hrs to fix

                        Method initialize has 56 lines of code (exceeds 25 allowed). Consider refactoring.
                        Open

                          def initialize(info = {})
                            super(
                              update_info(
                                info,
                                'Name' => 'GitLab File Read Remote Code Execution',
                        Severity: Major
                        Found in modules/exploits/multi/http/gitlab_file_read_rce.rb - About 2 hrs to fix

                          Method initialize has 56 lines of code (exceeds 25 allowed). Consider refactoring.
                          Open

                            def initialize(info = {})
                              super(
                                update_info(
                                  info,
                                  'Name' => 'Rudder Server SQLI Remote Code Execution',
                          Severity: Major
                          Found in modules/exploits/multi/http/rudder_server_sqli_rce.rb - About 2 hrs to fix

                            Method create_zip_and_upload has 56 lines of code (exceeds 25 allowed). Consider refactoring.
                            Open

                              def create_zip_and_upload(exploit)
                                @pl_file = Rex::Text.rand_text_alpha_lower(6..10)
                                @pl_file << '.php'
                                register_file_for_cleanup(@pl_file)
                                @header = Rex::Text.rand_text_alpha_upper(4)
                            Severity: Major
                            Found in modules/exploits/multi/http/atutor_upload_traversal.rb - About 2 hrs to fix

                              Method check has 56 lines of code (exceeds 25 allowed). Consider refactoring.
                              Open

                                def check
                                  res = send_request_cgi({'uri' => target_uri.path })
                              
                                  unless res
                                    vprint_error("Connection timed out")
                              Severity: Major
                              Found in modules/exploits/multi/http/joomla_http_header_rce.rb - About 2 hrs to fix

                                Method initialize has 56 lines of code (exceeds 25 allowed). Consider refactoring.
                                Open

                                  def initialize(info = {})
                                    super(
                                      update_info(
                                        info,
                                        'Name'         => 'WebNMS Framework Server Arbitrary File Upload',
                                Severity: Major
                                Found in modules/exploits/multi/http/webnms_file_upload.rb - About 2 hrs to fix

                                  Method check has 56 lines of code (exceeds 25 allowed). Consider refactoring.
                                  Open

                                    def check
                                  
                                      if (target.name =~ /Unix/)
                                        connect
                                  
                                  
                                  Severity: Major
                                  Found in modules/exploits/multi/misc/openview_omniback_exec.rb - About 2 hrs to fix

                                    Method initialize has 56 lines of code (exceeds 25 allowed). Consider refactoring.
                                    Open

                                      def initialize( info = {} )
                                    
                                        super( update_info( info,
                                          'Name'          => 'Java Applet JMX Remote Code Execution',
                                          'Description'   => %q{
                                    Severity: Major
                                    Found in modules/exploits/multi/browser/java_jre17_jmxbean.rb - About 2 hrs to fix

                                      Method initialize has 56 lines of code (exceeds 25 allowed). Consider refactoring.
                                      Open

                                        def initialize(info = {})
                                          super(update_info(info,
                                            'Name'           => 'freeFTPd 1.0 Username Overflow',
                                            'Description'    => %q{
                                                This module exploits a stack buffer overflow in the freeFTPd
                                      Severity: Major
                                      Found in modules/exploits/windows/ftp/freeftpd_user.rb - About 2 hrs to fix

                                        Method exploit has 56 lines of code (exceeds 25 allowed). Consider refactoring.
                                        Open

                                          def exploit
                                            if !datastore['ExitOnSession'] && !job_id
                                              fail_with(Failure::Unknown, "Setting ExitOnSession to false requires running as a job (exploit -j)")
                                            end
                                        
                                        
                                        Severity: Major
                                        Found in modules/exploits/windows/local/powershell_remoting.rb - About 2 hrs to fix
                                          Severity
                                          Category
                                          Status
                                          Source
                                          Language