Showing 7,361 of 22,177 total issues
Method get_environment
has 71 lines of code (exceeds 25 allowed). Consider refactoring. Open
Open
def get_environment(rhost)
print_status("#{rhost}:#{rport} [SAP] Connecting to SAP Management Console SOAP Interface ")
success = false
soapenv = 'http://schemas.xmlsoap.org/soap/envelope/'
Method accessfile
has 71 lines of code (exceeds 25 allowed). Consider refactoring. Open
Open
def accessfile(rhost)
uri = normalize_uri(target_uri.path)
print_status("#{rhost}:#{rport} Connecting to Crowd SOAP Interface")
soapenv = 'http://schemas.xmlsoap.org/soap/envelope/'
Method do_login
has 71 lines of code (exceeds 25 allowed). Consider refactoring. Open
Open
def do_login(user, pass)
print_status("#{rhost}:#{rport} - Trying username:#{user.inspect} with password:#{pass.inspect}")
begin
res = send_request_cgi(
Method initialize
has 71 lines of code (exceeds 25 allowed). Consider refactoring. Open
Open
def initialize
super(
'Name' => 'OpenSSL Heartbeat (Heartbleed) Information Leak',
'Description' => %q{
This module implements the OpenSSL Heartbleed attack. The problem
Method run_host
has 71 lines of code (exceeds 25 allowed). Consider refactoring. Open
Open
def run_host(ip)
# If we have a session make use of it
if session
print_status("Using existing session #{session.sid}")
self.mysql_conn = session.client
Method run
has 71 lines of code (exceeds 25 allowed). Consider refactoring. Open
Open
def run
init_fuzzdata()
init_vars()
print_status("Grabbing webpage #{datastore['URL']} from #{datastore['RHOST']}")
Method check
has 71 lines of code (exceeds 25 allowed). Consider refactoring. Open
Open
def check
# obtain token and cookie required for login
res = send_request_cgi 'uri' => normalize_uri(target_uri.path, 'bolt', 'login')
return CheckCode::Unknown('Connection failed') unless res
Method exploit
has 71 lines of code (exceeds 25 allowed). Consider refactoring. Open
Open
def exploit
base = target_uri.path
base << '/' if base[-1, 1] != '/'
@fname = rand_text_alphanumeric(rand(10) + 6) + '.php'
Method initialize
has 71 lines of code (exceeds 25 allowed). Consider refactoring. Open
Open
def initialize(info = {})
super(
update_info(
info,
'Name' => 'ManageEngine ADSelfService Plus Unauthenticated SAML RCE',
Method execute_command
has 71 lines of code (exceeds 25 allowed). Consider refactoring. Open
Open
def execute_command(cmd, _opts = {})
if target['Type'] == :windows_dropper
cmd = "cmd /c #{cmd}"
end
cmd = cmd.encode(xml: :attr).gsub('"', '')
Method initialize
has 71 lines of code (exceeds 25 allowed). Consider refactoring. Open
Open
def initialize(info = {})
super(update_info(info,
'Name' => 'Jenkins ACL Bypass and Metaprogramming RCE',
'Description' => %q{
This module exploits a vulnerability in Jenkins dynamic routing to
Method initialize
has 71 lines of code (exceeds 25 allowed). Consider refactoring. Open
Open
def initialize(info = {})
super(
update_info(
info,
'Name' => 'Apache Struts Remote Command Execution',
Method initialize
has 71 lines of code (exceeds 25 allowed). Consider refactoring. Open
Open
def initialize(info = {})
super(update_info(info,
'Name' => 'Java RMI Server Insecure Default Configuration Java Code Execution',
'Description' => %q{
This module takes advantage of the default configuration of the RMI Registry and
Method initialize
has 71 lines of code (exceeds 25 allowed). Consider refactoring. Open
Open
def initialize(info = {})
super(
update_info(
info,
'Name' => 'LNK Code Execution Vulnerability',
Method initialize
has 71 lines of code (exceeds 25 allowed). Consider refactoring. Open
Open
def initialize(info = {})
super(
update_info(
info,
'Name' => 'Advantech iView Unauthenticated Remote Code Execution',
Method initialize
has 71 lines of code (exceeds 25 allowed). Consider refactoring. Open
Open
def initialize(info = {})
super(
update_info(
info,
'Name' => 'DotNetNuke Cookie Deserialization Remote Code Excecution',
Method initialize
has 71 lines of code (exceeds 25 allowed). Consider refactoring. Open
Open
def initialize(info = {})
super(update_info(info,
'Name' => 'FlexNet License Server Manager lmgrd Buffer Overflow',
'Description' => %q{
This module exploits a vulnerability in the FlexNet
Method initialize
has 71 lines of code (exceeds 25 allowed). Consider refactoring. Open
Open
def initialize(info={})
super(update_info(info,
'Name' => "MS12-037 Microsoft Internet Explorer Same ID Property Deleted Object Handling Memory Corruption",
'Description' => %q{
This module exploits a memory corruption flaw in Internet Explorer 8 when
Method on_request_uri
has 71 lines of code (exceeds 25 allowed). Consider refactoring. Open
Open
def on_request_uri(cli, request)
#Pick the right target
my_target = get_target(cli, request)
if my_target.nil?
vprint_error("Target not supported")
Method initialize
has 71 lines of code (exceeds 25 allowed). Consider refactoring. Open
Open
def initialize(info={})
super(update_info(info,
'Name' => "MS14-064 Microsoft Internet Explorer Windows OLE Automation Array Remote Code Execution",
'Description' => %q{
This module exploits the Windows OLE Automation array vulnerability, CVE-2014-6332.