rapid7/metasploit-framework

View on GitHub

Showing 7,361 of 22,177 total issues

Method initialize has 62 lines of code (exceeds 25 allowed). Consider refactoring.
Open

  def initialize(info = {})
    super(merge_info(info,
      'Name'          => 'Linux Command Shell, Reverse TCP Inline',
      'Description'   => 'Connect back to attacker and spawn a command shell',
      'License'       => MSF_LICENSE,
Severity: Major
Found in modules/payloads/singles/linux/aarch64/shell_reverse_tcp.rb - About 2 hrs to fix

    Method initialize has 62 lines of code (exceeds 25 allowed). Consider refactoring.
    Open

      def initialize(info = {})
        super(update_info(info,
          'Name'             => 'ImageMagick Delegate Arbitrary Command Execution',
          'Description'      => %q{
            This module exploits a shell command injection in the way "delegates"
    Severity: Major
    Found in modules/exploits/unix/fileformat/imagemagick_delegate.rb - About 2 hrs to fix

      Method initialize has 62 lines of code (exceeds 25 allowed). Consider refactoring.
      Open

        def initialize(info = {})
          super(
            update_info(
              info,
              'Name' => 'TrixBox CE endpoint_devicemap.php Authenticated Command Execution',
      Severity: Major
      Found in modules/exploits/unix/webapp/trixbox_ce_endpoint_devicemap_rce.rb - About 2 hrs to fix

        Method generate_jsp_encoded has 62 lines of code (exceeds 25 allowed). Consider refactoring.
        Open

          def generate_jsp_encoded(files)
            native_payload_name = rand_text_alpha(rand(6)+3)
            ext = (@my_target['Platform'] == 'win') ? '.exe' : '.bin'
        
            var_raw     = rand_text_alpha(rand(8) + 3)
        Severity: Major
        Found in modules/exploits/multi/http/manage_engine_dc_pmp_sqli.rb - About 2 hrs to fix

          Method upload_exec has 62 lines of code (exceeds 25 allowed). Consider refactoring.
          Open

            def upload_exec(upm_token, good_cookie)
              contents = ''
              name = Rex::Text.rand_text_alpha(8..12)
          
              atlassian_plugin_xml = %Q{
          Severity: Major
          Found in modules/exploits/multi/http/jira_plugin_upload.rb - About 2 hrs to fix

            Method exploit has 62 lines of code (exceeds 25 allowed). Consider refactoring.
            Open

              def exploit
                init = send_request_cgi({
                  'uri' => normalize_uri(target_uri.path, 'index.php'),
                  'keep_cookies' => true
                })
            Severity: Major
            Found in modules/exploits/multi/http/moodle_spelling_binary_rce.rb - About 2 hrs to fix

              Method initialize has 62 lines of code (exceeds 25 allowed). Consider refactoring.
              Open

                def initialize(info = {})
                  super(
                    update_info(
                      info,
                      'Name' => 'Unauthenticated RCE in Bricks Builder Theme',
              Severity: Major
              Found in modules/exploits/multi/http/wp_bricks_builder_rce.rb - About 2 hrs to fix

                Method initialize has 62 lines of code (exceeds 25 allowed). Consider refactoring.
                Open

                  def initialize(info = {})
                    super(
                      update_info(
                        info,
                        'Name' => 'AVideo WWBNIndex Plugin Unauthenticated RCE',
                Severity: Major
                Found in modules/exploits/multi/http/avideo_wwbnindex_unauth_rce.rb - About 2 hrs to fix

                  Method exploit has 62 lines of code (exceeds 25 allowed). Consider refactoring.
                  Open

                    def exploit
                      user = datastore['USERNAME']
                      pass = datastore['PASSWORD']
                      rpath = normalize_uri(datastore['PATH'])
                  
                  
                  Severity: Major
                  Found in modules/exploits/multi/http/axis2_deployer.rb - About 2 hrs to fix

                    Method generate_html has 62 lines of code (exceeds 25 allowed). Consider refactoring.
                    Open

                      def generate_html(target_info)
                        key = Rex::Text.rand_text_alpha(5 + rand(12))
                        frame = Rex::Text.rand_text_alpha(5 + rand(12))
                        r = Rex::Text.rand_text_alpha(5 + rand(12))
                        opts = { key => run_payload } # defined in FirefoxPrivilegeEscalation mixin
                    Severity: Major
                    Found in modules/exploits/multi/browser/firefox_webidl_injection.rb - About 2 hrs to fix

                      Method initialize has 62 lines of code (exceeds 25 allowed). Consider refactoring.
                      Open

                        def initialize(info = {})
                          super(
                            update_info(
                              info,
                              'Name' => 'WebLogic Server Deserialization RCE BadAttributeValueExpException ExtComp',
                      Severity: Major
                      Found in modules/exploits/multi/misc/weblogic_deserialize_badattr_extcomp.rb - About 2 hrs to fix

                        Method exploit has 62 lines of code (exceeds 25 allowed). Consider refactoring.
                        Open

                          def exploit
                            check_pcaprub_loaded # Check first
                        
                            ret_offset = target['RetOff']
                        
                        
                        Severity: Major
                        Found in modules/exploits/multi/misc/wireshark_lwres_getaddrbyname_loop.rb - About 2 hrs to fix

                          Method check has 62 lines of code (exceeds 25 allowed). Consider refactoring.
                          Open

                            def check
                              snmp_x_uri = normalize_uri(target_uri.path, 'snmp-x.php')
                              vprint_status("Check if #{snmp_x_uri} exists")
                              res = send_request_cgi(
                                'uri' => snmp_x_uri,
                          Severity: Major
                          Found in modules/exploits/freebsd/webapp/spamtitan_unauth_rce.rb - About 2 hrs to fix

                            Method req_teamcity_6 has 62 lines of code (exceeds 25 allowed). Consider refactoring.
                            Open

                              def req_teamcity_6(script_content)
                                build_id = Rex::Text.rand_text_numeric(8)
                                xml_payload = %(
                            <?xml version="1.0" encoding="UTF-8"?>
                            <methodCall>
                            Severity: Major
                            Found in modules/exploits/multi/misc/teamcity_agent_xmlrpc_exec.rb - About 2 hrs to fix

                              Method upload_file has 62 lines of code (exceeds 25 allowed). Consider refactoring.
                              Open

                                def upload_file(filename, my_payload)
                                  connect
                              
                                  # Get Application version
                                  data = [0x14].pack("C")
                              Severity: Major
                              Found in modules/exploits/windows/scada/indusoft_webstudio_exec.rb - About 2 hrs to fix

                                Method initialize has 62 lines of code (exceeds 25 allowed). Consider refactoring.
                                Open

                                  def initialize(info = {})
                                    super(
                                      update_info(
                                        info,
                                        'Name' => 'Windows Privilege Escalation via TokenMagic (UAC Bypass)',
                                Severity: Major
                                Found in modules/exploits/windows/local/tokenmagic.rb - About 2 hrs to fix

                                  Method initialize has 62 lines of code (exceeds 25 allowed). Consider refactoring.
                                  Open

                                    def initialize(info = {})
                                      super(
                                        update_info(
                                          info,
                                          {
                                  Severity: Major
                                  Found in modules/exploits/windows/local/cve_2023_28252_clfs_driver.rb - About 2 hrs to fix

                                    Method initialize has 62 lines of code (exceeds 25 allowed). Consider refactoring.
                                    Open

                                      def initialize(info = {})
                                        super(
                                          update_info(
                                            info,
                                            'Name'    => 'MS13-005 HWND_BROADCAST Low to Medium Integrity Privilege Escalation',
                                    Severity: Major
                                    Found in modules/exploits/windows/local/ms13_005_hwnd_broadcast.rb - About 2 hrs to fix

                                      Method initialize has 62 lines of code (exceeds 25 allowed). Consider refactoring.
                                      Open

                                        def initialize(info = {})
                                          super(
                                            update_info(
                                              info,
                                              'Name' => "Powershell Payload Execution",
                                      Severity: Major
                                      Found in modules/exploits/windows/local/ps_persist.rb - About 2 hrs to fix

                                        Method initialize has 62 lines of code (exceeds 25 allowed). Consider refactoring.
                                        Open

                                          def initialize(info = {})
                                            super(
                                              update_info(
                                                info,
                                                {
                                        Severity: Major
                                        Found in modules/exploits/windows/local/cve_2022_21882_win32k.rb - About 2 hrs to fix
                                          Severity
                                          Category
                                          Status
                                          Source
                                          Language