rapid7/metasploit-framework

View on GitHub
modules/exploits/multi/http/wp_plugin_sp_project_document_rce.rb

Summary

Maintainability
A
2 hrs
Test Coverage

Method initialize has 38 lines of code (exceeds 25 allowed). Consider refactoring.
Open

  def initialize(info = {})
    super(
      update_info(
        info,
        'Name' => 'Wordpress Plugin SP Project and Document - Authenticated Remote Code Execution',
Severity: Minor
Found in modules/exploits/multi/http/wp_plugin_sp_project_document_rce.rb - About 1 hr to fix

    Method exploit has 36 lines of code (exceeds 25 allowed). Consider refactoring.
    Open

      def exploit
        cookie = wordpress_login(datastore['USERNAME'], datastore['PASSWORD'])
        fail_with(Failure::NoAccess, 'Authentication failed') unless cookie
        user_id = get_user_id(cookie)
        payload_name = "#{Rex::Text.rand_text_alpha_lower(5)}.pHP"
    Severity: Minor
    Found in modules/exploits/multi/http/wp_plugin_sp_project_document_rce.rb - About 1 hr to fix

      There are no issues that match your filters.

      Category
      Status