rapid7/metasploit-framework

View on GitHub
lib/msf/core/exploit/remote/smb/client/web_exec.rb

Summary

Maintainability
A
1 hr
Test Coverage

Method wexec has 28 lines of code (exceeds 25 allowed). Consider refactoring.
Open

  def wexec(disconnect=true)
    simple.connect("\\\\#{datastore['RHOST']}\\IPC$")
    handle = dcerpc_handle('367abb81-9844-35f1-ad32-98f038001003', '2.0', 'ncacn_np', ["\\svcctl"])
    vprint_status("Binding to #{handle} ...")
    dcerpc_bind(handle)
Severity: Minor
Found in lib/msf/core/exploit/remote/smb/client/web_exec.rb - About 1 hr to fix

    There are no issues that match your filters.

    Category
    Status