modules/exploits/windows/fileformat/winrar_cve_2023_38831.rb
Method initialize
has 37 lines of code (exceeds 25 allowed). Consider refactoring. Open
Open
def initialize(info = {})
super(
update_info(
info,
'Name' => 'WinRAR CVE-2023-38831 Exploit',
Method exploit
has 30 lines of code (exceeds 25 allowed). Consider refactoring. Open
Open
def exploit
Dir.mktmpdir do |temp_dir|
output_rar = File.join(Msf::Config.local_directory, datastore['OUTPUT_FILE'])
input_file = datastore['INPUT_FILE']
decoy_name = File.basename(input_file)