rapid7/metasploit-framework

View on GitHub

Showing 7,361 of 22,177 total issues

Method initialize has 53 lines of code (exceeds 25 allowed). Consider refactoring.
Open

  def initialize(info = {})
    super(update_info(info,
      'Name'           => 'WordPress W3 Total Cache PHP Code Execution',
      'Description'    => %q{
          This module exploits a PHP Code Injection vulnerability against WordPress plugin
Severity: Major
Found in modules/exploits/unix/webapp/wp_total_cache_exec.rb - About 2 hrs to fix

    Method initialize has 53 lines of code (exceeds 25 allowed). Consider refactoring.
    Open

      def initialize(info = {})
        super(
          update_info(
            info,
            'Name' => 'macOS Gatekeeper check bypass',
    Severity: Major
    Found in modules/exploits/osx/browser/osx_gatekeeper_bypass.rb - About 2 hrs to fix

      Method initialize has 53 lines of code (exceeds 25 allowed). Consider refactoring.
      Open

        def initialize(info = {})
          super(update_info(info,
            'Name'           => 'WP Database Backup RCE',
            'Description'    => %q(
              There exists a command injection vulnerability in the Wordpress plugin
      Severity: Major
      Found in modules/exploits/multi/http/wp_db_backup_rce.rb - About 2 hrs to fix

        Method initialize has 53 lines of code (exceeds 25 allowed). Consider refactoring.
        Open

          def initialize(info = {})
            super(update_info(info,
              'Name'           => 'Novell ServiceDesk Authenticated File Upload',
              'Description'    => %q{
                This module exploits an authenticated arbitrary file upload via directory traversal
        Severity: Major
        Found in modules/exploits/multi/http/novell_servicedesk_rce.rb - About 2 hrs to fix

          Method upload_war_and_exec has 53 lines of code (exceeds 25 allowed). Consider refactoring.
          Open

            def upload_war_and_exec(try_again, app_base)
              tomcat_path = '../../../tomcat/'
              servlet_path = '/servlet/com.me.opmanager.extranet.remote.communication.fw.fe.FileCollector'
          
              if try_again
          Severity: Major
          Found in modules/exploits/multi/http/opmanager_socialit_file_upload.rb - About 2 hrs to fix

            Method initialize has 53 lines of code (exceeds 25 allowed). Consider refactoring.
            Open

              def initialize(info = {})
                super(
                  update_info(
                    info,
                    'Name' => 'Git LFS Clone Command Exec',
            Severity: Major
            Found in modules/exploits/multi/http/git_lfs_clone_command_exec.rb - About 2 hrs to fix

              Method initialize has 53 lines of code (exceeds 25 allowed). Consider refactoring.
              Open

                def initialize(info = {})
                  super(
                    update_info(
                      info,
                      'Name' => 'WordPress Hash Form Plugin RCE',
              Severity: Major
              Found in modules/exploits/multi/http/wp_hash_form_rce.rb - About 2 hrs to fix

                Method initialize has 53 lines of code (exceeds 25 allowed). Consider refactoring.
                Open

                  def initialize( info = {} )
                
                    super( update_info( info,
                      'Name'          => 'Java Applet Method Handle Remote Code Execution',
                      'Description'   => %q{
                Severity: Major
                Found in modules/exploits/multi/browser/java_jre17_method_handle.rb - About 2 hrs to fix

                  Method create_post has 53 lines of code (exceeds 25 allowed). Consider refactoring.
                  Open

                    def create_post(cookie)
                      vprint_status('Creating new post')
                      # get post ID and nonces
                      res = send_request_cgi(
                        'uri' => normalize_uri(target_uri.path, 'wp-admin', 'post-new.php'),
                  Severity: Major
                  Found in modules/exploits/multi/http/wp_popular_posts_rce.rb - About 2 hrs to fix

                    Method initialize has 53 lines of code (exceeds 25 allowed). Consider refactoring.
                    Open

                      def initialize(info = {})
                        super(update_info(info,
                          'Name'           => 'Firefox 3.5 escape() Return Value Memory Corruption',
                          'Description'    => %q{
                              This module exploits a memory corruption vulnerability in the Mozilla
                    Severity: Major
                    Found in modules/exploits/multi/browser/firefox_escape_retval.rb - About 2 hrs to fix

                      Method exploit has 53 lines of code (exceeds 25 allowed). Consider refactoring.
                      Open

                        def exploit
                          if is_root?
                            fail_with Failure::BadConfig, 'Session already has root privileges'
                          end
                      
                      
                      Severity: Major
                      Found in modules/exploits/solaris/local/extremeparr_dtappgather_priv_esc.rb - About 2 hrs to fix

                        Method initialize has 53 lines of code (exceeds 25 allowed). Consider refactoring.
                        Open

                          def initialize(info = {})
                            super(
                              update_info(
                                info,
                                'Name' => 'OpenBSD Dynamic Loader chpass Privilege Escalation',
                        Severity: Major
                        Found in modules/exploits/openbsd/local/dynamic_loader_chpass_privesc.rb - About 2 hrs to fix

                          Method initialize has 53 lines of code (exceeds 25 allowed). Consider refactoring.
                          Open

                            def initialize(info = {})
                              super(
                                update_info(
                                  info,
                                  'Name' => 'Windows Persistent Registry Startup Payload Installer',
                          Severity: Major
                          Found in modules/exploits/windows/local/persistence.rb - About 2 hrs to fix

                            Method exploit has 53 lines of code (exceeds 25 allowed). Consider refactoring.
                            Open

                              def exploit
                                if is_system?
                                  fail_with(Failure::None, 'Session is already elevated')
                                end
                            
                            
                            Severity: Major
                            Found in modules/exploits/windows/local/srclient_dll_hijacking.rb - About 2 hrs to fix

                              Method initialize has 53 lines of code (exceeds 25 allowed). Consider refactoring.
                              Open

                                def initialize(info = {})
                                  super(
                                    update_info(
                                      info,
                                      'Name' => 'Windows Manage User Level Persistent Payload Installer',
                              Severity: Major
                              Found in modules/exploits/windows/local/s4u_persistence.rb - About 2 hrs to fix

                                Method initialize has 53 lines of code (exceeds 25 allowed). Consider refactoring.
                                Open

                                  def initialize(info = {})
                                    super(
                                      update_info(
                                        info,
                                        {
                                Severity: Major
                                Found in modules/exploits/windows/local/lenovo_systemupdate.rb - About 2 hrs to fix

                                  Method initialize has 53 lines of code (exceeds 25 allowed). Consider refactoring.
                                  Open

                                    def initialize(info = {})
                                      super(
                                        update_info(
                                          info,
                                          'Name' => 'FortiNet FortiClient Endpoint Management Server FCTID SQLi to RCE',
                                  Severity: Major
                                  Found in modules/exploits/windows/http/forticlient_ems_fctid_sqli.rb - About 2 hrs to fix

                                    Method find_key has 53 lines of code (exceeds 25 allowed). Consider refactoring.
                                    Open

                                      def find_key(cipher_text)
                                        print_status('Finding Key...')
                                    
                                        # Counter
                                        total_keys = @key_charset.length**8
                                    Severity: Major
                                    Found in modules/exploits/windows/http/dnn_cookie_deserialization_rce.rb - About 2 hrs to fix

                                      Method initialize has 53 lines of code (exceeds 25 allowed). Consider refactoring.
                                      Open

                                        def initialize(info = {})
                                          super(
                                            update_info(
                                              info,
                                              'Name' => 'Cayin xPost wayfinder_seqid SQLi to RCE',
                                      Severity: Major
                                      Found in modules/exploits/windows/http/cayin_xpost_sql_rce.rb - About 2 hrs to fix

                                        Method initialize has 53 lines of code (exceeds 25 allowed). Consider refactoring.
                                        Open

                                          def initialize(info = {})
                                            super(
                                              update_info(
                                                info,
                                                'Name' => 'Plex Unpickle Dict Windows RCE',
                                        Severity: Major
                                        Found in modules/exploits/windows/http/plex_unpickle_dict_rce.rb - About 2 hrs to fix
                                          Severity
                                          Category
                                          Status
                                          Source
                                          Language