rapid7/metasploit-framework

View on GitHub

Showing 7,361 of 22,177 total issues

Method wp_cleanup has 70 lines of code (exceeds 25 allowed). Consider refactoring.
Open

  def wp_cleanup(shell_name, post_id, cookie)
    print_status('Attempting to clean up files...')
    uri = normalize_uri(datastore['TARGETURI'], 'wp-admin', 'admin-ajax.php')
    res = send_request_cgi(
      'method'    => 'POST',
Severity: Major
Found in modules/exploits/multi/http/wp_crop_rce.rb - About 2 hrs to fix

    Method execute_command has 70 lines of code (exceeds 25 allowed). Consider refactoring.
    Open

      def execute_command(cmd, _opts = {})
        uri = target_uri.path
        job_name = datastore['JOB_NAME'] == '' ? Rex::Text.rand_text_alpha(5..10) : datastore['JOB_NAME']
        print_status("Creating job '#{job_name}'")
    
    
    Severity: Major
    Found in modules/exploits/multi/misc/nomad_exec.rb - About 2 hrs to fix

      Method req_teamcity_8 has 70 lines of code (exceeds 25 allowed). Consider refactoring.
      Open

        def req_teamcity_8(script_content)
          build_id = Rex::Text.rand_text_numeric(8)
          xml_payload = %(
      <?xml version="1.0" encoding="UTF-8"?>
      <methodCall>
      Severity: Major
      Found in modules/exploits/multi/misc/teamcity_agent_xmlrpc_exec.rb - About 2 hrs to fix

        Method exploit has 70 lines of code (exceeds 25 allowed). Consider refactoring.
        Open

          def exploit
            # Validate that we can actually do things before we bother
            # doing any more work
            check_permissions!
        
        
        Severity: Major
        Found in modules/exploits/windows/local/bypassuac_sluihijack.rb - About 2 hrs to fix

          Method exploit has 70 lines of code (exceeds 25 allowed). Consider refactoring.
          Open

            def exploit
              commspec = '%COMSPEC%'
              registry_view = REGISTRY_VIEW_NATIVE
              psh_path = '%WINDIR%\\System32\\WindowsPowershell\\v1.0\\powershell.exe'
          
          
          Severity: Major
          Found in modules/exploits/windows/local/bypassuac_fodhelper.rb - About 2 hrs to fix

            Method check has 70 lines of code (exceeds 25 allowed). Consider refactoring.
            Open

              def check
                target_check_results = adaudit_plus_target_check
                target_check_msg = target_check_results['message']
                case target_check_results['status']
                when adaudit_plus_status::CONNECTION_FAILED

              Method initialize has 70 lines of code (exceeds 25 allowed). Consider refactoring.
              Open

                def initialize(info = {})
                  super(
                    update_info(
                      info,
                      'Name' => 'HP OpenView Network Node Manager ov.dll _OVBuildPath Buffer Overflow',
              Severity: Major
              Found in modules/exploits/windows/http/hp_nnm_ovbuildpath_textfile.rb - About 2 hrs to fix

                Method initialize has 70 lines of code (exceeds 25 allowed). Consider refactoring.
                Open

                  def initialize(info = {})
                    super(update_info(info,
                      'Name'        => 'HP AutoPass License Server File Upload',
                      'Description' => %q{
                        This module exploits a code execution flaw in HP AutoPass License Server. It abuses two
                Severity: Major
                Found in modules/exploits/windows/http/hp_autopass_license_traversal.rb - About 2 hrs to fix

                  Method on_request_uri has 70 lines of code (exceeds 25 allowed). Consider refactoring.
                  Open

                    def on_request_uri(cli, request)
                      if request.uri =~ /\.exe$/
                        return if ((p = regenerate_payload(cli)) == nil)
                  
                        register_file_for_cleanup("#{@stage_name}") unless @dropped_files and @dropped_files.include?("#{@stage_name}")
                  Severity: Major
                  Found in modules/exploits/windows/browser/notes_handler_cmdinject.rb - About 2 hrs to fix

                    Method make_pdf has 70 lines of code (exceeds 25 allowed). Consider refactoring.
                    Open

                      def make_pdf(u3d_stream, js_doc, js_pg1)
                    
                        xref = []
                        eol = "\x0a"
                        obj_end = "" << eol << "endobj" << eol
                    Severity: Major
                    Found in modules/exploits/windows/fileformat/adobe_u3d_meshdecl.rb - About 2 hrs to fix

                      Method exploit has 70 lines of code (exceeds 25 allowed). Consider refactoring.
                      Open

                        def exploit
                          nop = "\x42"
                          junk = 'ABC'.split('').sample              #junk must specifically static (A, B, and C only)
                          buffer = ""
                          buffer << junk * target['Offset']
                      Severity: Major
                      Found in modules/exploits/windows/fileformat/cyberlink_lpp_bof.rb - About 2 hrs to fix

                        Method initialize has 70 lines of code (exceeds 25 allowed). Consider refactoring.
                        Open

                          def initialize(info = {})
                            super(
                              update_info(
                                info,
                                'Name' => 'TerraMaster TOS 4.2.29 or lower - Unauthenticated RCE chaining CVE-2022-24990 and CVE-2022-24989',
                        Severity: Major
                        Found in modules/exploits/linux/http/terramaster_unauth_rce_cve_2022_24990.rb - About 2 hrs to fix

                          Method initialize has 70 lines of code (exceeds 25 allowed). Consider refactoring.
                          Open

                            def initialize(info = {})
                              super(
                                update_info(
                                  info,
                                  'Name' => 'VMware vCenter Server Analytics (CEIP) Service File Upload',
                          Severity: Major
                          Found in modules/exploits/linux/http/vmware_vcenter_analytics_file_upload.rb - About 2 hrs to fix

                            Method initialize has 70 lines of code (exceeds 25 allowed). Consider refactoring.
                            Open

                              def initialize(info = {})
                                super(
                                  update_info(
                                    info,
                                    'Name' => 'Apache Spark Unauthenticated Command Injection RCE',
                            Severity: Major
                            Found in modules/exploits/linux/http/apache_spark_rce_cve_2022_33891.rb - About 2 hrs to fix

                              Method initialize has 70 lines of code (exceeds 25 allowed). Consider refactoring.
                              Open

                                def initialize(info = {})
                                  super(
                                    update_info(
                                      info,
                                      'Name' => 'Artica proxy 4.30.000000 Auth Bypass service-cmds-peform Command Injection',

                                Method initialize has 70 lines of code (exceeds 25 allowed). Consider refactoring.
                                Open

                                  def initialize(info = {})
                                    super(
                                      update_info(
                                        info,
                                        'Name' => 'Chaos RAT XSS to RCE',
                                Severity: Major
                                Found in modules/exploits/linux/http/chaos_rat_xss_to_rce.rb - About 2 hrs to fix

                                  Method initialize has 70 lines of code (exceeds 25 allowed). Consider refactoring.
                                  Open

                                    def initialize(info = {})
                                      super(update_info(info,
                                        'Name'           => 'Samba is_known_pipename() Arbitrary Module Load',
                                        'Description'    => %q{
                                            This module triggers an arbitrary shared library load vulnerability
                                  Severity: Major
                                  Found in modules/exploits/linux/samba/is_known_pipename.rb - About 2 hrs to fix

                                    Method exploit has 70 lines of code (exceeds 25 allowed). Consider refactoring.
                                    Open

                                      def exploit
                                        opts = ssh_client_defaults.merge({
                                          auth_methods: ['keyboard-interactive'],
                                          port: rport,
                                          password: password
                                    Severity: Major
                                    Found in modules/exploits/linux/ssh/solarwinds_lem_exec.rb - About 2 hrs to fix

                                      Method exist_and_supported has 70 lines of code (exceeds 25 allowed). Consider refactoring.
                                      Open

                                        def exist_and_supported
                                          case session.platform
                                          when 'linux'
                                            user = session.shell_command('whoami')
                                            print_status("Current user is #{user}")
                                      Severity: Major
                                      Found in modules/post/multi/manage/dbvis_add_db_admin.rb - About 2 hrs to fix

                                        Method run has 70 lines of code (exceeds 25 allowed). Consider refactoring.
                                        Open

                                          def run
                                            opt = {}
                                            opt['PADDING'] = datastore['PADDING'] if datastore['PADDING']
                                            opt['FC'] = datastore['FC'] if datastore['FC']
                                            pids = get_current_data_pids(datastore['CANBUS'], datastore['SRCID'], datastore['DSTID'], opt)
                                        Severity: Major
                                        Found in modules/post/hardware/automotive/getvinfo.rb - About 2 hrs to fix
                                          Severity
                                          Category
                                          Status
                                          Source
                                          Language