Showing 7,361 of 22,177 total issues
Avoid deeply nested control flow statements. Open
Open
if masterList[x]["name"] == name
masterList[x]["path"] << server["path"].first.dup
masterList[x]["path"].last << name
unless shelled.include?(name)
if parse_results[0][2]==1
Avoid deeply nested control flow statements. Open
Open
break if session_created?
Avoid deeply nested control flow statements. Open
Open
break if session_created?
Avoid deeply nested control flow statements. Open
Open
if l.include? 'VERSION="'
number = l.split("=")[1].split('"')[1]
if number.match /(\d+\.)?(\d+\.)?(\d+\.)?(\*|\d+)$/
if number <= '8.1.1.50' and not number < '7'
return Exploit::CheckCode::Appears
Avoid deeply nested control flow statements. Open
Open
next unless (round3_byte_array[i] == keystr3_byte_array[j])
Avoid deeply nested control flow statements. Open
Open
next unless (round3_byte_array[i] == keystr2_byte_array[j])
Avoid deeply nested control flow statements. Open
Open
if Rex::Version.new(phpversion) < Rex::Version.new('5.6.39')
vprint_good("PHP Version #{phpversion} is vulnerable")
return CheckCode::Appears
else
vprint_bad("PHP Version #{phpversion} is NOT vulnerable, patched in 5.6.39.")
Avoid deeply nested control flow statements. Open
Open
unless res
print_error('Error loading site. Check options.')
return
end
Avoid deeply nested control flow statements. Open
Open
if res.code == 302
cookie = res.get_cookies
print_good('Login Success')
else
print_error('Failed Login, check options.')
Avoid deeply nested control flow statements. Open
Open
if /name='e-token' value='(?<etoken>\w{32})'/ =~ res.body && /_system::procEmailBounce.+?cron_execute\[(?<cron_id>\d)\]/m =~ res.body
print_good("Triggering manual run of mail bounch check cron to execute payload with cron id #{cron_id} and etoken #{etoken}")
# The post request has several duplicate columns, however all were not required. Left them commented for documentation purposes
send_request_cgi(
'method' => 'POST',
Avoid deeply nested control flow statements. Open
Open
elsif target.name =~ /custom/
print_status('Listener started for 300 seconds')
print_good("POST request connection string: x #{command}}")
# URI.encode leaves + as + since that's a space encoded. So we manually change it.
print_good("GET request connection string: #{URI::DEFAULT_PARSER.escape("x " + command + "}").sub! '+', '%2B'}")
Avoid deeply nested control flow statements. Open
Open
if res.body.include? 'Status: <b>Disabled</b>'
print_error('Cron disabled, unexploitable.')
return
end
Avoid deeply nested control flow statements. Open
Open
unless res
print_error('Error loading site. Check options.')
return
end
Avoid deeply nested control flow statements. Open
Open
unless res
print_error('Error loading site. Check options.')
return
end
Avoid deeply nested control flow statements. Open
Open
@my_target = targets[1] if target['auto']
Avoid deeply nested control flow statements. Open
Open
rescue Rex::Post::Meterpreter::RequestError
print_error("Failed to resolve SLD hostname: #{sld_hostname}")
Avoid deeply nested control flow statements. Open
Open
if migrate_system
print_status('Trying to get SYSTEM privilege')
results = session.priv.getsystem
if results[0]
print_good('Got SYSTEM privilege')
Avoid deeply nested control flow statements. Open
Open
if version.build_number.between?(Msf::WindowsVersion::Server2008_SP0, Msf::WindowsVersion::Server2012_R2) && version.windows_server?
move_to_sys
file_local_write(pwdfile, inject_hashdump)
else
print_error('Could not get NTDS hashes!')
Avoid deeply nested control flow statements. Open
Open
if migrate_system
print_status('Trying to get SYSTEM privilege')
results = session.priv.getsystem
if results[0]
print_good('Got SYSTEM privilege')
Avoid deeply nested control flow statements. Open
Open
elsif migrate_system
print_status('Trying to get SYSTEM privilege')
results = session.priv.getsystem
if results[0]
print_good('Got SYSTEM privilege')