rapid7/metasploit-framework

View on GitHub

Showing 22,177 of 22,177 total issues

Avoid too many return statements within this method.
Open

      return CheckCode::Safe('Failed to verify if any Active Directory domains are configured on the target.')

    Avoid too many return statements within this method.
    Open

          return CheckCode::Detected("The provided AUTH_DOMAIN #{auth_domain} does not match the configured authentication domain(s).")

      Avoid too many return statements within this method.
      Open

            return CheckCode::Safe("AjaxPro version #{@ajax_pro[:version]} is not vulnerable.")
      Severity: Major
      Found in modules/exploits/windows/http/ajaxpro_deserialization_rce.rb - About 30 mins to fix

        Avoid too many return statements within this method.
        Open

              return CheckCode::Unknown(build_msg)

          Avoid too many return statements within this method.
          Open

                return
          Severity: Major
          Found in modules/exploits/windows/http/landesk_thinkmanagement_upload_asp.rb - About 30 mins to fix

            Avoid too many return statements within this method.
            Open

                  return

              Avoid too many return statements within this method.
              Open

                    return false
              Severity: Major
              Found in modules/exploits/windows/http/dnn_cookie_deserialization_rce.rb - About 30 mins to fix

                Avoid too many return statements within this method.
                Open

                        return CheckCode::Appears("The target is ADAudit Plus #{build_version} and the endpoint for CVE-2021-42847 exists.")

                  Avoid too many return statements within this method.
                  Open

                        return CheckCode::Unknown(login_msg)

                    Avoid too many return statements within this method.
                    Open

                          return CheckCode::Detected("Target is ZenTao version #{@version}.")
                    Severity: Major
                    Found in modules/exploits/windows/http/zentao_pro_rce.rb - About 30 mins to fix

                      Avoid too many return statements within this method.
                      Open

                              return CheckCode::Detected("The target is ADAudit Plus #{build_version} but the connection failed when checking for the CVE-2021-42847 endpoint")

                        Avoid too many return statements within this method.
                        Open

                              return CheckCode::Unknown('Unable to obtain the tokens required for authentication')
                        Severity: Major
                        Found in modules/exploits/windows/http/zentao_pro_rce.rb - About 30 mins to fix

                          Avoid too many return statements within this method.
                          Open

                              return CheckCode::Appears("Target is ZenTao version #{@version}.")
                          Severity: Major
                          Found in modules/exploits/windows/http/zentao_pro_rce.rb - About 30 mins to fix

                            Avoid too many return statements within this method.
                            Open

                                  return CheckCode::Appears("But method '#{datastore['Method']}' with parameter '#{datastore['Parameter']}' was not found in namespace '#{datastore['Namespace']}'")
                            Severity: Major
                            Found in modules/exploits/windows/http/ajaxpro_deserialization_rce.rb - About 30 mins to fix

                              Avoid too many return statements within this method.
                              Open

                                    return CheckCode::Detected('Failed to authenticate to the server.')
                              Severity: Major
                              Found in modules/exploits/windows/http/flexdotnetcms_upload_exec.rb - About 30 mins to fix

                                Avoid too many return statements within this method.
                                Open

                                      return CheckCode::Detected('Received unexpected response while trying to follow redirect to /Admin/')
                                Severity: Major
                                Found in modules/exploits/windows/http/flexdotnetcms_upload_exec.rb - About 30 mins to fix

                                  Avoid too many return statements within this method.
                                  Open

                                        return CheckCode::Detected("Connection failed while trying to open test file #{@payload_txt} in the file editor")
                                  Severity: Major
                                  Found in modules/exploits/windows/http/flexdotnetcms_upload_exec.rb - About 30 mins to fix

                                    Avoid too many return statements within this method.
                                    Open

                                        return CheckCode::Vulnerable('Target is FlexDotnetCMS v1.5.8 or lower.')
                                    Severity: Major
                                    Found in modules/exploits/windows/http/flexdotnetcms_upload_exec.rb - About 30 mins to fix

                                      Avoid too many return statements within this method.
                                      Open

                                            return Exploit::CheckCode::Appears if version >= Rex::Version.new('15.0.0') && version < Rex::Version.new('15.0.3')
                                      Severity: Major
                                      Found in modules/exploits/windows/http/moveit_cve_2023_34362.rb - About 30 mins to fix

                                        Avoid too many return statements within this method.
                                        Open

                                              return CheckCode::Detected("Connection failed while trying to rename the test file #{@payload_txt}.")
                                        Severity: Major
                                        Found in modules/exploits/windows/http/flexdotnetcms_upload_exec.rb - About 30 mins to fix
                                          Severity
                                          Category
                                          Status
                                          Source
                                          Language