rapid7/metasploit-framework

View on GitHub
modules/exploits/multi/http/apache_druid_cve_2023_25194.rb

Summary

Maintainability
A
3 hrs
Test Coverage

Method initialize has 60 lines of code (exceeds 25 allowed). Consider refactoring.
Open

  def initialize(_info = {})
    super(
      'Name' => 'Apache Druid JNDI Injection RCE',
      'Description' => %q{

Severity: Major
Found in modules/exploits/multi/http/apache_druid_cve_2023_25194.rb - About 2 hrs to fix

    Method trigger has 28 lines of code (exceeds 25 allowed). Consider refactoring.
    Open

      def trigger
        data = {
          type: 'kafka',
          spec: {
            type: 'kafka',
    Severity: Minor
    Found in modules/exploits/multi/http/apache_druid_cve_2023_25194.rb - About 1 hr to fix

      There are no issues that match your filters.

      Category
      Status