modules/exploits/linux/http/f5_icontrol_soap_csrf_rce_cve_2022_41622.rb
Method initialize
has 66 lines of code (exceeds 25 allowed). Consider refactoring. Open
Open
def initialize(info = {})
super(
update_info(
info,
'Name' => 'F5 BIG-IP iControl CSRF File Write SOAP API',
Method on_request_uri
has 52 lines of code (exceeds 25 allowed). Consider refactoring. Open
Open
def on_request_uri(socket, _request)
if datastore['TARGET'] == 0 # restart
filename = '/shared/f5_update_action'
file_payload = <<~EOT
UpdateAction