modules/exploits/linux/http/microfocus_secure_messaging_gateway.rb
Method initialize
has 43 lines of code (exceeds 25 allowed). Consider refactoring. Open
Open
def initialize(info={})
super(update_info(info,
'Name' => "MicroFocus Secure Messaging Gateway Remote Code Execution",
'Description' => %q{
This module exploits a SQL injection and command injection vulnerability in MicroFocus Secure Messaging Gateway.
Method implant_payload
has 37 lines of code (exceeds 25 allowed). Consider refactoring. Open
Open
def implant_payload(cookie)
print_status('Creating a domain record with a malformed DKIM data')
p = [
{
:id => 'temp_0',