rapid7/metasploit-framework

View on GitHub

Showing 22,177 of 22,177 total issues

Avoid too many return statements within this method.
Open

      return CheckCode::Unknown("Failed to obtain a valid OpenTSDB version: #{e}")
Severity: Major
Found in modules/exploits/linux/http/opentsdb_key_cmd_injection.rb - About 30 mins to fix

    Avoid too many return statements within this method.
    Open

        return CheckCode::Safe("This determination is based on the version string: #{prog_version}.")
    Severity: Major
    Found in modules/exploits/linux/http/grandstream_ucm62xx_sendemail_rce.rb - About 30 mins to fix

      Avoid too many return statements within this method.
      Open

            return true
      Severity: Major
      Found in modules/exploits/linux/http/apache_couchdb_cmd_exec.rb - About 30 mins to fix

        Avoid too many return statements within this method.
        Open

                return CheckCode::Appears("The target is OpenTSDB version #{version}")
        Severity: Major
        Found in modules/exploits/linux/http/opentsdb_key_cmd_injection.rb - About 30 mins to fix

          Avoid too many return statements within this method.
          Open

              return CheckCode::Vulnerable("#{peer} - H2 web interface found, and database connection successful") if res.body.include? 'Test successful'
          Severity: Major
          Found in modules/exploits/linux/http/h2_webinterface_rce.rb - About 30 mins to fix

            Avoid too many return statements within this method.
            Open

                  return Exploit::CheckCode::Detected if build == '3810'
            Severity: Major
            Found in modules/exploits/linux/http/synology_dsm_sliceupload_exec_noauth.rb - About 30 mins to fix

              Avoid too many return statements within this method.
              Open

                    return CheckCode::Detected('Could not determine the OpenTSDB version: the HTTP response body did not match the expected JSON format.')
              Severity: Major
              Found in modules/exploits/linux/http/opentsdb_key_cmd_injection.rb - About 30 mins to fix

                Avoid too many return statements within this method.
                Open

                    return true
                Severity: Major
                Found in modules/exploits/linux/http/apache_couchdb_cmd_exec.rb - About 30 mins to fix

                  Avoid too many return statements within this method.
                  Open

                        return Exploit::CheckCode::Appears if build < '3810'
                  Severity: Major
                  Found in modules/exploits/linux/http/synology_dsm_sliceupload_exec_noauth.rb - About 30 mins to fix

                    Avoid too many return statements within this method.
                    Open

                        return CheckCode::Safe

                      Avoid too many return statements within this method.
                      Open

                            return CheckCode::Detected('Could not determine the OpenTSDB version: the HTTP response body did not match the expected JSON format.')
                      Severity: Major
                      Found in modules/exploits/linux/http/opentsdb_key_cmd_injection.rb - About 30 mins to fix

                        Avoid too many return statements within this method.
                        Open

                            return CheckCode::Unknown("#{peer} - Check URI Path, unexpected HTTP response code: #{res.code}") unless res.code == 200
                        Severity: Major
                        Found in modules/exploits/linux/http/h2_webinterface_rce.rb - About 30 mins to fix

                          Avoid too many return statements within this method.
                          Open

                                return Rex::Version.new(@glinet['firmware']) >= Rex::Version.new('4.0.0') && Rex::Version.new(@glinet['firmware']) <= Rex::Version.new('4.4.2')
                          Severity: Major
                          Found in modules/exploits/linux/http/glinet_unauth_rce_cve_2023_50445.rb - About 30 mins to fix

                            Avoid too many return statements within this method.
                            Open

                                  return CheckCode::Appears("Exploitable Version Detected: #{@version}")
                            Severity: Major
                            Found in modules/exploits/linux/http/kibana_upgrade_assistant_telemetry_rce.rb - About 30 mins to fix

                              Avoid too many return statements within this method.
                              Open

                                    return res_cmd_output
                              Severity: Major
                              Found in modules/exploits/linux/http/optergy_bms_backdoor_rce_cve_2019_7276.rb - About 30 mins to fix

                                Avoid too many return statements within this method.
                                Open

                                      return Rex::Version.new(@glinet['firmware']) >= Rex::Version.new('4.0.0') && Rex::Version.new(@glinet['firmware']) < Rex::Version.new('4.5.0')
                                Severity: Major
                                Found in modules/exploits/linux/http/glinet_unauth_rce_cve_2023_50445.rb - About 30 mins to fix

                                  Avoid too many return statements within this method.
                                  Open

                                      return if @staging_key.include? nil
                                  Severity: Major
                                  Found in modules/exploits/linux/http/empire_skywalker.rb - About 30 mins to fix

                                    Avoid too many return statements within this method.
                                    Open

                                              return nil
                                    Severity: Major
                                    Found in modules/exploits/linux/http/cacti_unauthenticated_cmd_injection.rb - About 30 mins to fix

                                      Avoid too many return statements within this method.
                                      Open

                                              return CheckCode::Safe("The target is Cacti version #{version}")
                                      Severity: Major
                                      Found in modules/exploits/linux/http/cacti_unauthenticated_cmd_injection.rb - About 30 mins to fix

                                        Avoid too many return statements within this method.
                                        Open

                                              return CheckCode::Unknown("Failed to obtain a valid Cacti version: #{e}")
                                        Severity: Major
                                        Found in modules/exploits/linux/http/cacti_unauthenticated_cmd_injection.rb - About 30 mins to fix
                                          Severity
                                          Category
                                          Status
                                          Source
                                          Language