rapid7/metasploit-framework

View on GitHub
modules/exploits/windows/fileformat/ms13_071_theme.rb

Summary

Maintainability
A
3 hrs
Test Coverage

Method initialize has 51 lines of code (exceeds 25 allowed). Consider refactoring.
Open

  def initialize(info={})
    super(update_info(info,
      'Name'           => "MS13-071 Microsoft Windows Theme File Handling Arbitrary Code Execution",
      'Description'    => %q{
        This module exploits a vulnerability mainly affecting Microsoft Windows XP and Windows
Severity: Major
Found in modules/exploits/windows/fileformat/ms13_071_theme.rb - About 2 hrs to fix

    Method primer has 32 lines of code (exceeds 25 allowed). Consider refactoring.
    Open

      def primer
        self.file_contents = generate_payload_exe
        print_status("Malicious SCR available on #{unc}...")
    
        # Default Windows XP / 2003 theme modified
    Severity: Minor
    Found in modules/exploits/windows/fileformat/ms13_071_theme.rb - About 1 hr to fix

      There are no issues that match your filters.

      Category
      Status