rapid7/metasploit-framework

View on GitHub
modules/exploits/multi/http/zabbix_script_exec.rb

Summary

Maintainability
C
7 hrs
Test Coverage

File zabbix_script_exec.rb has 303 lines of code (exceeds 250 allowed). Consider refactoring.
Open

class MetasploitModule < Msf::Exploit::Remote
  Rank = ExcellentRanking

  include Msf::Exploit::Retry
  include Msf::Exploit::Remote::HttpClient
Severity: Minor
Found in modules/exploits/multi/http/zabbix_script_exec.rb - About 3 hrs to fix

    Method initialize has 67 lines of code (exceeds 25 allowed). Consider refactoring.
    Open

      def initialize(info = {})
        super(
          update_info(
            info,
            'Name' => 'Zabbix Authenticated Remote Command Execution',
    Severity: Major
    Found in modules/exploits/multi/http/zabbix_script_exec.rb - About 2 hrs to fix

      Method create_host has 31 lines of code (exceeds 25 allowed). Consider refactoring.
      Open

        def create_host(auth_token, group_id)
          host = rand_text_alpha(18)
          @host_name = host
      
          print_status("Creating a host called #{host}")
      Severity: Minor
      Found in modules/exploits/multi/http/zabbix_script_exec.rb - About 1 hr to fix

        There are no issues that match your filters.

        Category
        Status