modules/exploits/unix/webapp/egallery_upload_exec.rb
Method initialize
has 41 lines of code (exceeds 25 allowed). Consider refactoring. Open
Open
def initialize(info={})
super(update_info(info,
'Name' => "EGallery PHP File Upload Vulnerability",
'Description' => %q{
This module exploits a vulnerability found in EGallery 1.2 By abusing the
Method exploit
has 36 lines of code (exceeds 25 allowed). Consider refactoring. Open
Open
def exploit
uri = normalize_uri(target_uri.path)
uri << '/' if uri[-1,1] != '/'
peer = "#{rhost}:#{rport}"