rapid7/metasploit-framework

View on GitHub
modules/auxiliary/sqli/oracle/dbms_cdc_subscribe_activate_subscription.rb

Summary

Maintainability
A
2 hrs
Test Coverage

Method initialize has 27 lines of code (exceeds 25 allowed). Consider refactoring.
Open

  def initialize(info = {})
    super(update_info(info,
      'Name'           => 'Oracle DB SQL Injection via SYS.DBMS_CDC_SUBSCRIBE.ACTIVATE_SUBSCRIPTION',
      'Description'    => %q{
        This module will escalate an Oracle DB user to DBA by exploiting a sql injection

    Method run has 26 lines of code (exceeds 25 allowed). Consider refactoring.
    Open

      def run
        return if not check_dependencies
    
        name = Rex::Text.rand_text_alpha(rand(10) + 1)
    
    

      There are no issues that match your filters.

      Category
      Status