Showing 7,361 of 22,177 total issues
Method initialize
has 62 lines of code (exceeds 25 allowed). Consider refactoring. Open
Open
def initialize(info = {})
super(merge_info(info,
'Name' => 'Linux Command Shell, Reverse TCP Inline',
'Description' => 'Connect back to attacker and spawn a command shell',
'License' => MSF_LICENSE,
Method initialize
has 62 lines of code (exceeds 25 allowed). Consider refactoring. Open
Open
def initialize(info = {})
super(update_info(info,
'Name' => 'ImageMagick Delegate Arbitrary Command Execution',
'Description' => %q{
This module exploits a shell command injection in the way "delegates"
Method initialize
has 62 lines of code (exceeds 25 allowed). Consider refactoring. Open
Open
def initialize(info = {})
super(
update_info(
info,
'Name' => 'TrixBox CE endpoint_devicemap.php Authenticated Command Execution',
Method generate_jsp_encoded
has 62 lines of code (exceeds 25 allowed). Consider refactoring. Open
Open
def generate_jsp_encoded(files)
native_payload_name = rand_text_alpha(rand(6)+3)
ext = (@my_target['Platform'] == 'win') ? '.exe' : '.bin'
var_raw = rand_text_alpha(rand(8) + 3)
Method upload_exec
has 62 lines of code (exceeds 25 allowed). Consider refactoring. Open
Open
def upload_exec(upm_token, good_cookie)
contents = ''
name = Rex::Text.rand_text_alpha(8..12)
atlassian_plugin_xml = %Q{
Method exploit
has 62 lines of code (exceeds 25 allowed). Consider refactoring. Open
Open
def exploit
init = send_request_cgi({
'uri' => normalize_uri(target_uri.path, 'index.php'),
'keep_cookies' => true
})
Method initialize
has 62 lines of code (exceeds 25 allowed). Consider refactoring. Open
Open
def initialize(info = {})
super(
update_info(
info,
'Name' => 'Unauthenticated RCE in Bricks Builder Theme',
Method initialize
has 62 lines of code (exceeds 25 allowed). Consider refactoring. Open
Open
def initialize(info = {})
super(
update_info(
info,
'Name' => 'AVideo WWBNIndex Plugin Unauthenticated RCE',
Method exploit
has 62 lines of code (exceeds 25 allowed). Consider refactoring. Open
Open
def exploit
user = datastore['USERNAME']
pass = datastore['PASSWORD']
rpath = normalize_uri(datastore['PATH'])
Method generate_html
has 62 lines of code (exceeds 25 allowed). Consider refactoring. Open
Open
def generate_html(target_info)
key = Rex::Text.rand_text_alpha(5 + rand(12))
frame = Rex::Text.rand_text_alpha(5 + rand(12))
r = Rex::Text.rand_text_alpha(5 + rand(12))
opts = { key => run_payload } # defined in FirefoxPrivilegeEscalation mixin
Method initialize
has 62 lines of code (exceeds 25 allowed). Consider refactoring. Open
Open
def initialize(info = {})
super(
update_info(
info,
'Name' => 'WebLogic Server Deserialization RCE BadAttributeValueExpException ExtComp',
Method exploit
has 62 lines of code (exceeds 25 allowed). Consider refactoring. Open
Open
def exploit
check_pcaprub_loaded # Check first
ret_offset = target['RetOff']
Method check
has 62 lines of code (exceeds 25 allowed). Consider refactoring. Open
Open
def check
snmp_x_uri = normalize_uri(target_uri.path, 'snmp-x.php')
vprint_status("Check if #{snmp_x_uri} exists")
res = send_request_cgi(
'uri' => snmp_x_uri,
Method req_teamcity_6
has 62 lines of code (exceeds 25 allowed). Consider refactoring. Open
Open
def req_teamcity_6(script_content)
build_id = Rex::Text.rand_text_numeric(8)
xml_payload = %(
<?xml version="1.0" encoding="UTF-8"?>
<methodCall>
Method upload_file
has 62 lines of code (exceeds 25 allowed). Consider refactoring. Open
Open
def upload_file(filename, my_payload)
connect
# Get Application version
data = [0x14].pack("C")
Method initialize
has 62 lines of code (exceeds 25 allowed). Consider refactoring. Open
Open
def initialize(info = {})
super(
update_info(
info,
'Name' => 'Windows Privilege Escalation via TokenMagic (UAC Bypass)',
Method initialize
has 62 lines of code (exceeds 25 allowed). Consider refactoring. Open
Open
def initialize(info = {})
super(
update_info(
info,
{
Method initialize
has 62 lines of code (exceeds 25 allowed). Consider refactoring. Open
Open
def initialize(info = {})
super(
update_info(
info,
'Name' => 'MS13-005 HWND_BROADCAST Low to Medium Integrity Privilege Escalation',
Method initialize
has 62 lines of code (exceeds 25 allowed). Consider refactoring. Open
Open
def initialize(info = {})
super(
update_info(
info,
'Name' => "Powershell Payload Execution",
Method initialize
has 62 lines of code (exceeds 25 allowed). Consider refactoring. Open
Open
def initialize(info = {})
super(
update_info(
info,
{