rapid7/metasploit-framework

View on GitHub

Showing 7,361 of 22,177 total issues

Method initialize has 53 lines of code (exceeds 25 allowed). Consider refactoring.
Open

  def initialize(info = {})
    super(
      update_info(
        info,
        'Name' => 'Apache ActiveMQ 5.x-5.11.1 Directory Traversal Shell Upload',
Severity: Major
Found in modules/exploits/windows/http/apache_activemq_traversal_upload.rb - About 2 hrs to fix

    Method initialize has 53 lines of code (exceeds 25 allowed). Consider refactoring.
    Open

      def initialize(info = {})
        super(update_info(info,
          'Name'           => 'MS10-022 Microsoft Internet Explorer Winhlp32.exe MsgBox Code Execution',
          'Description'    => %q{
              This module exploits a code execution vulnerability that occurs when a user
    Severity: Major
    Found in modules/exploits/windows/browser/ms10_022_ie_vbscript_winhlp32.rb - About 2 hrs to fix

      Method on_request_uri has 53 lines of code (exceeds 25 allowed). Consider refactoring.
      Open

        def on_request_uri(cli, request)
      
          if (!request.uri.match(/\?\w+/))
            send_local_redirect(cli, "?#{@javascript_encode_key}")
            return
      Severity: Major
      Found in modules/exploits/windows/browser/ms09_002_memory_corruption.rb - About 2 hrs to fix

        Method initialize has 53 lines of code (exceeds 25 allowed). Consider refactoring.
        Open

          def initialize(info = {})
            super(update_info(info,
              'Name'           => 'WebEx UCF atucfobj.dll ActiveX NewObject Method Buffer Overflow',
              'Description'    => %q{
                  This module exploits a stack-based buffer overflow in WebEx's WebexUCFObject
        Severity: Major
        Found in modules/exploits/windows/browser/webex_ucf_newobject.rb - About 2 hrs to fix

          Method initialize has 53 lines of code (exceeds 25 allowed). Consider refactoring.
          Open

            def initialize(info = {})
              super(update_info(info,
                'Name'           => 'eSignal and eSignal Pro File Parsing Buffer Overflow in QUO',
                'Description'    => %q{
                  The software is unable to handle the "<StyleTemplate>" files (even those
          Severity: Major
          Found in modules/exploits/windows/fileformat/esignal_styletemplate_bof.rb - About 2 hrs to fix

            Method initialize has 53 lines of code (exceeds 25 allowed). Consider refactoring.
            Open

              def initialize(info = {})
                super(update_info(info,
                  'Name'           => 'RealNetworks RealPlayer Version Attribute Buffer Overflow',
                  'Description'    => %q{
                    This module exploits a stack-based buffer overflow vulnerability in
            Severity: Major
            Found in modules/exploits/windows/fileformat/realplayer_ver_attribute_bof.rb - About 2 hrs to fix

              Method initialize has 53 lines of code (exceeds 25 allowed). Consider refactoring.
              Open

                def initialize(info = {})
                  super(update_info(info,
                    'Name'           => 'Adobe Doc.media.newPlayer Use After Free Vulnerability',
                    'Description'    => %q{
                      This module exploits a use after free vulnerability in Adobe Reader and Adobe Acrobat
              Severity: Major
              Found in modules/exploits/windows/fileformat/adobe_media_newplayer.rb - About 2 hrs to fix

                Method initialize has 53 lines of code (exceeds 25 allowed). Consider refactoring.
                Open

                  def initialize(info = {})
                    super(
                      update_info(
                        info,
                        'Name' => 'Microsoft Office Word MSDTJS',
                Severity: Major
                Found in modules/exploits/windows/fileformat/word_msdtjs_rce.rb - About 2 hrs to fix

                  Method exploit has 53 lines of code (exceeds 25 allowed). Consider refactoring.
                  Open

                    def exploit
                      if !datastore['ForceExploit'] && is_root?
                        fail_with(Failure::BadConfig, 'Session already has root privileges. Set ForceExploit to override.')
                      end
                  
                  
                  Severity: Major
                  Found in modules/exploits/linux/local/libuser_roothelper_priv_esc.rb - About 2 hrs to fix

                    Method exploit has 53 lines of code (exceeds 25 allowed). Consider refactoring.
                    Open

                      def exploit
                        if !datastore['ForceExploit'] && is_root?
                          fail_with(Failure::BadConfig, 'Session already has root privileges. Set ForceExploit to override.')
                        end
                    
                    
                    Severity: Major
                    Found in modules/exploits/linux/local/cve_2021_3493_overlayfs.rb - About 2 hrs to fix

                      Method initialize has 53 lines of code (exceeds 25 allowed). Consider refactoring.
                      Open

                        def initialize(info = {})
                          super(update_info(info,
                            'Name'           => 'VMware Workstation ALSA Config File Local Privilege Escalation',
                            'Description'    => %q{
                              This module exploits a vulnerability in VMware Workstation Pro and
                      Severity: Major
                      Found in modules/exploits/linux/local/vmware_alsa_config.rb - About 2 hrs to fix

                        Method exploit has 53 lines of code (exceeds 25 allowed). Consider refactoring.
                        Open

                          def exploit
                            if datastore['SRVHOST'] == '0.0.0.0'
                              fail_with(Failure::BadConfig, 'SRVHOST must be an IP address accessible from another computer')
                            end
                        
                        
                        Severity: Major
                        Found in modules/exploits/linux/http/railo_cfml_rfi.rb - About 2 hrs to fix

                          Method initialize has 53 lines of code (exceeds 25 allowed). Consider refactoring.
                          Open

                            def initialize(info = {})
                              super(update_info(
                                info,
                                'Name'        => 'Huawei HG532n Command Injection',
                                'Description' => %q(
                          Severity: Major
                          Found in modules/exploits/linux/http/huawei_hg532n_cmdinject.rb - About 2 hrs to fix

                            Method initialize has 53 lines of code (exceeds 25 allowed). Consider refactoring.
                            Open

                              def initialize(info = {})
                                super(update_info(info,
                                  'Name'           => 'Sophos Web Protection Appliance sblistpack Arbitrary Command Execution',
                                  'Description'    => %q{
                                    This module exploits a command injection vulnerability on Sophos Web Protection Appliance
                            Severity: Major
                            Found in modules/exploits/linux/http/sophos_wpa_sblistpack_exec.rb - About 2 hrs to fix

                              Method initialize has 53 lines of code (exceeds 25 allowed). Consider refactoring.
                              Open

                                def initialize(info = {})
                                  super(
                                    update_info(
                                      info,
                                      'Name' => 'Jenkins CLI Deserialization',
                              Severity: Major
                              Found in modules/exploits/linux/http/jenkins_cli_deserialization.rb - About 2 hrs to fix

                                Method initialize has 53 lines of code (exceeds 25 allowed). Consider refactoring.
                                Open

                                  def initialize(info = {})
                                    super(
                                      update_info(
                                        info,
                                        'Name' => 'Palo Alto Networks PAN-OS Unauthenticated Remote Code Execution',
                                Severity: Major
                                Found in modules/exploits/linux/http/panos_telemetry_cmd_exec.rb - About 2 hrs to fix

                                  Method initialize has 53 lines of code (exceeds 25 allowed). Consider refactoring.
                                  Open

                                    def initialize(info = {})
                                      super(
                                        update_info(
                                          info,
                                          'Name' => 'Kibana Upgrade Assistant Telemetry Collector Prototype Pollution',
                                  Severity: Major
                                  Found in modules/exploits/linux/http/kibana_upgrade_assistant_telemetry_rce.rb - About 2 hrs to fix

                                    Method initialize has 53 lines of code (exceeds 25 allowed). Consider refactoring.
                                    Open

                                      def initialize(info = {})
                                        super(update_info(info,
                                          'Name'           => 'AsusWRT LAN Unauthenticated Remote Code Execution',
                                          'Description'    => %q{
                                          The HTTP server in AsusWRT has a flaw where it allows an unauthenticated client to
                                    Severity: Major
                                    Found in modules/exploits/linux/http/asuswrt_lan_rce.rb - About 2 hrs to fix

                                      Method initialize has 53 lines of code (exceeds 25 allowed). Consider refactoring.
                                      Open

                                        def initialize(_info = {})
                                          super(
                                            'Name' => 'MobileIron Core Unauthenticated JNDI Injection RCE (via Log4Shell)',
                                            'Description' => %q{
                                              MobileIron Core is affected by the Log4Shell vulnerability whereby a JNDI string sent to the server
                                      Severity: Major
                                      Found in modules/exploits/linux/http/mobileiron_core_log4shell.rb - About 2 hrs to fix

                                        Method initialize has 53 lines of code (exceeds 25 allowed). Consider refactoring.
                                        Open

                                          def initialize(info = {})
                                            super(
                                              update_info(
                                                info,
                                                'Name' => 'Zyxel Unauthenticated LAN Remote Code Execution',
                                        Severity: Major
                                        Found in modules/exploits/linux/misc/zyxel_multiple_devices_zhttp_lan_rce.rb - About 2 hrs to fix
                                          Severity
                                          Category
                                          Status
                                          Source
                                          Language