rapid7/metasploit-framework

View on GitHub

Showing 7,361 of 22,177 total issues

Method initialize has 65 lines of code (exceeds 25 allowed). Consider refactoring.
Open

  def initialize(info = {})
    super(update_info(info,
      'Name'          => 'Mac OS X Sudo Password Bypass',
      'Description'   => %q{
        This module gains a session with root permissions on versions of OS X with
Severity: Major
Found in modules/exploits/osx/local/sudo_password_bypass.rb - About 2 hrs to fix

    Method initialize has 65 lines of code (exceeds 25 allowed). Consider refactoring.
    Open

      def initialize(info = {})
        super(update_info(info,
          'Name'           => 'Subversion Date Svnserve',
          'Description'    => %q{
              This is an exploit for the Subversion date parsing overflow.  This
    Severity: Major
    Found in modules/exploits/multi/svn/svnserve_date.rb - About 2 hrs to fix

      Method initialize has 65 lines of code (exceeds 25 allowed). Consider refactoring.
      Open

        def initialize(info = {})
          super(update_info(info,
            'Name' => 'Apache mod_cgi Bash Environment Variable Code Injection (Shellshock)',
            'Description' => %q{
              This module exploits the Shellshock vulnerability, a flaw in how the Bash shell
      Severity: Major
      Found in modules/exploits/multi/http/apache_mod_cgi_bash_env_exec.rb - About 2 hrs to fix

        Method initialize has 65 lines of code (exceeds 25 allowed). Consider refactoring.
        Open

          def initialize(info = {})
            super(
              update_info(
                info,
                'Name' => 'Fortra GoAnywhere MFT Unsafe Deserialization RCE',
        Severity: Major
        Found in modules/exploits/multi/http/fortra_goanywhere_rce_cve_2023_0669.rb - About 2 hrs to fix

          Method initialize has 65 lines of code (exceeds 25 allowed). Consider refactoring.
          Open

            def initialize(info = {})
              super(update_info(info,
                'Name'           => 'Apache Struts 2 Namespace Redirect OGNL Injection',
                'Description'    => %q{
                  This module exploits a remote code execution vulnerability in Apache Struts
          Severity: Major
          Found in modules/exploits/multi/http/struts2_namespace_ognl.rb - About 2 hrs to fix

            Method initialize has 65 lines of code (exceeds 25 allowed). Consider refactoring.
            Open

              def initialize(info = {})
                super(update_info(info,
                  'Name'          => 'ManageEngine Multiple Products Authenticated File Upload',
                  'Description'   => %q{
                    This module exploits a directory traversal vulnerability in ManageEngine ServiceDesk,
            Severity: Major
            Found in modules/exploits/multi/http/manageengine_auth_upload.rb - About 2 hrs to fix

              Method initialize has 65 lines of code (exceeds 25 allowed). Consider refactoring.
              Open

                def initialize(info={})
                  super(update_info(info,
                    'Name' => 'Oracle Weblogic Server Deserialization RCE - MarshalledObject',
                    'Description' => %q{
                      An unauthenticated attacker with network access to the Oracle Weblogic Server T3
              Severity: Major
              Found in modules/exploits/multi/misc/weblogic_deserialize_marshalledobject.rb - About 2 hrs to fix

                Method initialize has 65 lines of code (exceeds 25 allowed). Consider refactoring.
                Open

                  def initialize(info = {})
                    super(update_info(info,
                      'Name'           => 'Solaris RSH Stack Clash Privilege Escalation',
                      'Description'    => %q{
                        This module exploits a vulnerability in RSH on unpatched Solaris
                Severity: Major
                Found in modules/exploits/solaris/local/rsh_stack_clash_priv_esc.rb - About 2 hrs to fix

                  Method exploit has 65 lines of code (exceeds 25 allowed). Consider refactoring.
                  Open

                    def exploit
                  
                      # This is the temporary path created in the spool directory
                      spath = "/var/spool/print"
                  
                  
                  Severity: Major
                  Found in modules/exploits/solaris/lpd/sendmail_exec.rb - About 2 hrs to fix

                    Method initialize has 65 lines of code (exceeds 25 allowed). Consider refactoring.
                    Open

                      def initialize(info = {})
                        super(
                          update_info(
                            info,
                            'Name' => 'FreeBSD rtld execl() Privilege Escalation',
                    Severity: Major
                    Found in modules/exploits/freebsd/local/rtld_execl_priv_esc.rb - About 2 hrs to fix

                      Method initialize has 65 lines of code (exceeds 25 allowed). Consider refactoring.
                      Open

                        def initialize(info = {})
                          super(
                            update_info(
                              info,
                              'Name' => 'Rockwell FactoryTalk View SE SCADA Unauthenticated Remote Code Execution',
                      Severity: Major
                      Found in modules/exploits/windows/scada/rockwell_factorytalk_rce.rb - About 2 hrs to fix

                        Method exploit has 65 lines of code (exceeds 25 allowed). Consider refactoring.
                        Open

                          def exploit
                            # Define default values
                            rvbs_name = datastore['VBS_NAME'] || Rex::Text.rand_text_alpha((rand(8) + 6))
                            rexe_name = datastore['EXE_NAME'] || Rex::Text.rand_text_alpha((rand(8) + 6))
                            reg_val = datastore['REG_NAME'] || Rex::Text.rand_text_alpha((rand(8) + 6))
                        Severity: Major
                        Found in modules/exploits/windows/local/persistence.rb - About 2 hrs to fix

                          Method initialize has 65 lines of code (exceeds 25 allowed). Consider refactoring.
                          Open

                            def initialize(info = {})
                              super(
                                update_info(
                                  info,
                                  'Name' => 'Razer Synapse rzpnk.sys ZwOpenProcess',
                          Severity: Major
                          Found in modules/exploits/windows/local/razer_zwopenprocess.rb - About 2 hrs to fix

                            Method exploit has 65 lines of code (exceeds 25 allowed). Consider refactoring.
                            Open

                              def exploit
                                if is_system?
                                  fail_with(Failure::None, 'Session is already elevated')
                                end
                            
                            

                              Method initialize has 65 lines of code (exceeds 25 allowed). Consider refactoring.
                              Open

                                def initialize(info = {})
                                  super(update_info(info,
                                    'Name'           => 'DiskBoss Enterprise GET Buffer Overflow',
                                    'Description'    => %q{
                                        This module exploits a stack-based buffer overflow vulnerability
                              Severity: Major
                              Found in modules/exploits/windows/http/diskboss_get_bof.rb - About 2 hrs to fix

                                Method initialize has 65 lines of code (exceeds 25 allowed). Consider refactoring.
                                Open

                                  def initialize(info = {})
                                    super(update_info(info,
                                      'Name'        => 'Sysax Multi Server 5.64 Create Folder Buffer Overflow',
                                      'Description'    => %q{
                                          This module exploits a stack buffer overflow in the create folder function in
                                Severity: Major
                                Found in modules/exploits/windows/http/sysax_create_folder.rb - About 2 hrs to fix

                                  Method process_propfind has 65 lines of code (exceeds 25 allowed). Consider refactoring.
                                  Open

                                    def process_propfind(cli, request, target)
                                      path = request.uri
                                      print_status("Received WebDAV PROPFIND request")
                                      body = ''
                                  
                                  
                                  Severity: Major
                                  Found in modules/exploits/windows/browser/ms10_022_ie_vbscript_winhlp32.rb - About 2 hrs to fix

                                    Method process_propfind has 65 lines of code (exceeds 25 allowed). Consider refactoring.
                                    Open

                                      def process_propfind(cli, request)
                                        path = request.uri
                                        vprint_status("Received WebDAV PROPFIND request from: #{path}")
                                        body = ''
                                    
                                    
                                    Severity: Major
                                    Found in modules/exploits/windows/fileformat/mcafee_showreport_exec.rb - About 2 hrs to fix

                                      Method initialize has 65 lines of code (exceeds 25 allowed). Consider refactoring.
                                      Open

                                        def initialize(info = {})
                                          super(update_info(info,
                                            'Name'           => 'MS09-067 Microsoft Excel Malformed FEATHEADER Record Vulnerability',
                                            'Description'    => %q{
                                                  This module exploits a vulnerability in the handling of the FEATHEADER record
                                      Severity: Major
                                      Found in modules/exploits/windows/fileformat/ms09_067_excel_featheader.rb - About 2 hrs to fix

                                        Method initialize has 65 lines of code (exceeds 25 allowed). Consider refactoring.
                                        Open

                                          def initialize(info = {})
                                            super(
                                              update_info(
                                                info,
                                                'Name' => 'ABRT raceabrt Privilege Escalation',
                                        Severity: Major
                                        Found in modules/exploits/linux/local/abrt_raceabrt_priv_esc.rb - About 2 hrs to fix
                                          Severity
                                          Category
                                          Status
                                          Source
                                          Language