rapid7/metasploit-framework

View on GitHub
modules/exploits/windows/browser/firefox_smil_uaf.rb

Summary

Maintainability
C
7 hrs
Test Coverage

Method exploit_html has 135 lines of code (exceeds 25 allowed). Consider refactoring.
Open

  def exploit_html(cli)
    p = payload.encoded
    arch = Rex::Arch.endian(target.arch)
    payload_final = Rex::Text.to_unescape(p, arch, prefix='\\u')
    base_uri = get_module_resource
Severity: Major
Found in modules/exploits/windows/browser/firefox_smil_uaf.rb - About 5 hrs to fix

    Method initialize has 50 lines of code (exceeds 25 allowed). Consider refactoring.
    Open

        def initialize(info={})
          super(update_info(info,
            'Name'           => "Firefox nsSMILTimeContainer::NotifyTimeChange() RCE",
            'Description'    => %q{
              This module exploits an out-of-bounds indexing/use-after-free condition present in
    Severity: Minor
    Found in modules/exploits/windows/browser/firefox_smil_uaf.rb - About 2 hrs to fix

      There are no issues that match your filters.

      Category
      Status