rapid7/metasploit-framework

View on GitHub
modules/exploits/linux/http/f5_icontrol_soap_csrf_rce_cve_2022_41622.rb

Summary

Maintainability
B
4 hrs
Test Coverage

Method initialize has 66 lines of code (exceeds 25 allowed). Consider refactoring.
Open

  def initialize(info = {})
    super(
      update_info(
        info,
        'Name' => 'F5 BIG-IP iControl CSRF File Write SOAP API',

    Method on_request_uri has 52 lines of code (exceeds 25 allowed). Consider refactoring.
    Open

      def on_request_uri(socket, _request)
        if datastore['TARGET'] == 0 # restart
          filename = '/shared/f5_update_action'
          file_payload = <<~EOT
            UpdateAction

      There are no issues that match your filters.

      Category
      Status