rapid7/metasploit-framework

View on GitHub
modules/auxiliary/gather/flash_rosetta_jsonp_url_disclosure.rb

Summary

Maintainability
A
2 hrs
Test Coverage

Method initialize has 35 lines of code (exceeds 25 allowed). Consider refactoring.
Open

  def initialize(info = {})
    super(update_info(info,
      'Name'           => 'Flash "Rosetta" JSONP GET/POST Response Disclosure',
      'Description'    => %q{
        A website that serves a JSONP endpoint that accepts a custom alphanumeric
Severity: Minor
Found in modules/auxiliary/gather/flash_rosetta_jsonp_url_disclosure.rb - About 1 hr to fix

    Method encoded_swf has 28 lines of code (exceeds 25 allowed). Consider refactoring.
    Open

      def encoded_swf
        "CWSMIKI0hCD0Up0IZUnnnnnnnnnnnnnnnnnnnUU5nnnnnn3Snn7iiudIbEAt333swW0s" \
        "sG03sDDtDDDt0333333Gt333swwv3wwwFPOHtoHHvwHHFhH3D0Up0IZUnnnnnnnnnnnn" \
        "nnnnnnnUU5nnnnnn3Snn7YNqdIbeUUUfV13333sDT133333333WEDDT13s03WVqefXAx" \
        "oookD8f8888T0CiudIbEAt33swwWpt03sDGDDDwwwtttttwwwGDt33333www033333Gf" \
    Severity: Minor
    Found in modules/auxiliary/gather/flash_rosetta_jsonp_url_disclosure.rb - About 1 hr to fix

      There are no issues that match your filters.

      Category
      Status