rapid7/metasploit-framework

View on GitHub
lib/msf/util/java_deserialization.rb

Summary

Maintainability
A
1 hr
Test Coverage

Method ysoserial_payload has 26 lines of code (exceeds 25 allowed). Consider refactoring.
Open

  def self.ysoserial_payload(payload_name, command=nil, modified_type: 'none')
    payloads_json = load_ysoserial_data(modified_type)

    # Extract the specified payload (status, lengthOffset, bufferOffset, bytes)
    payload = payloads_json[payload_name]
Severity: Minor
Found in lib/msf/util/java_deserialization.rb - About 1 hr to fix

    There are no issues that match your filters.

    Category
    Status