rapid7/metasploit-framework

View on GitHub
modules/exploits/windows/local/cve_2020_17136.rb

Summary

Maintainability
D
1 day
Test Coverage

Method initialize has 75 lines of code (exceeds 25 allowed). Consider refactoring.
Open

  def initialize(info = {})
    super(
      update_info(
        info,
        'Name' => 'CVE-2020-1170 Cloud Filter Arbitrary File Creation EOP',
Severity: Major
Found in modules/exploits/windows/local/cve_2020_17136.rb - About 3 hrs to fix

    File cve_2020_17136.rb has 275 lines of code (exceeds 250 allowed). Consider refactoring.
    Open

    class MetasploitModule < Msf::Exploit::Local
      include Exploit::EXE
      include Msf::Post::File
      include Msf::Post::Windows::Priv
      include Msf::Post::Windows::Version
    Severity: Minor
    Found in modules/exploits/windows/local/cve_2020_17136.rb - About 2 hrs to fix

      Method exploit has 43 lines of code (exceeds 25 allowed). Consider refactoring.
      Open

        def exploit
          if sysinfo['Architecture'] != ARCH_X64
            fail_with(Failure::NoTarget, 'This module currently only supports targeting x64 systems!')
          elsif session.arch != ARCH_X64
            fail_with(Failure::NoTarget, 'Sorry, WOW64 is not supported at this time!')
      Severity: Minor
      Found in modules/exploits/windows/local/cve_2020_17136.rb - About 1 hr to fix

        Method check has a Cognitive Complexity of 10 (exceeds 5 allowed). Consider refactoring.
        Open

          def check
            if session.platform != 'windows'
              # Non-Windows systems are definitely not affected.
              return CheckCode::Safe('Target is not a Windows system, so it is not affected by this vulnerability!')
            end
        Severity: Minor
        Found in modules/exploits/windows/local/cve_2020_17136.rb - About 1 hr to fix

        Cognitive Complexity

        Cognitive Complexity is a measure of how difficult a unit of code is to intuitively understand. Unlike Cyclomatic Complexity, which determines how difficult your code will be to test, Cognitive Complexity tells you how difficult your code will be to read and comprehend.

        A method's cognitive complexity is based on a few simple rules:

        • Code is not considered more complex when it uses shorthand that the language provides for collapsing multiple statements into one
        • Code is considered more complex for each "break in the linear flow of the code"
        • Code is considered more complex when "flow breaking structures are nested"

        Further reading

        Method exploit has a Cognitive Complexity of 9 (exceeds 5 allowed). Consider refactoring.
        Open

          def exploit
            if sysinfo['Architecture'] != ARCH_X64
              fail_with(Failure::NoTarget, 'This module currently only supports targeting x64 systems!')
            elsif session.arch != ARCH_X64
              fail_with(Failure::NoTarget, 'Sorry, WOW64 is not supported at this time!')
        Severity: Minor
        Found in modules/exploits/windows/local/cve_2020_17136.rb - About 55 mins to fix

        Cognitive Complexity

        Cognitive Complexity is a measure of how difficult a unit of code is to intuitively understand. Unlike Cyclomatic Complexity, which determines how difficult your code will be to test, Cognitive Complexity tells you how difficult your code will be to read and comprehend.

        A method's cognitive complexity is based on a few simple rules:

        • Code is not considered more complex when it uses shorthand that the language provides for collapsing multiple statements into one
        • Code is considered more complex for each "break in the linear flow of the code"
        • Code is considered more complex when "flow breaking structures are nested"

        Further reading

        Method read_output has a Cognitive Complexity of 8 (exceeds 5 allowed). Consider refactoring.
        Open

          def read_output(process)
            print_status('Start reading output')
            old_timeout = client.response_timeout
            client.response_timeout = 5
        
        
        Severity: Minor
        Found in modules/exploits/windows/local/cve_2020_17136.rb - About 45 mins to fix

        Cognitive Complexity

        Cognitive Complexity is a measure of how difficult a unit of code is to intuitively understand. Unlike Cyclomatic Complexity, which determines how difficult your code will be to test, Cognitive Complexity tells you how difficult your code will be to read and comprehend.

        A method's cognitive complexity is based on a few simple rules:

        • Code is not considered more complex when it uses shorthand that the language provides for collapsing multiple statements into one
        • Code is considered more complex for each "break in the linear flow of the code"
        • Code is considered more complex when "flow breaking structures are nested"

        Further reading

        Avoid too many return statements within this method.
        Open

              return CheckCode::Appears('A vulnerable Windows 10 v1809 build was detected!')
        Severity: Major
        Found in modules/exploits/windows/local/cve_2020_17136.rb - About 30 mins to fix

          Avoid too many return statements within this method.
          Open

                return CheckCode::Safe('The build number of the target machine does not appear to be a vulnerable version!')
          Severity: Major
          Found in modules/exploits/windows/local/cve_2020_17136.rb - About 30 mins to fix

            Avoid too many return statements within this method.
            Open

                  return CheckCode::Appears('A vulnerable Windows 10 v1803 build was detected!')
            Severity: Major
            Found in modules/exploits/windows/local/cve_2020_17136.rb - About 30 mins to fix

              Avoid too many return statements within this method.
              Open

                    return CheckCode::Appears('A vulnerable Windows 10 v1903 build was detected!')
              Severity: Major
              Found in modules/exploits/windows/local/cve_2020_17136.rb - About 30 mins to fix

                Method check_requirements has a Cognitive Complexity of 6 (exceeds 5 allowed). Consider refactoring.
                Open

                  def check_requirements(clr_req, installed_dotnet_versions)
                    installed_dotnet_versions.each do |fi|
                      if clr_req == 'v4.0.30319'
                        if fi[0] == '4'
                          vprint_status('Requirements ok')
                Severity: Minor
                Found in modules/exploits/windows/local/cve_2020_17136.rb - About 25 mins to fix

                Cognitive Complexity

                Cognitive Complexity is a measure of how difficult a unit of code is to intuitively understand. Unlike Cyclomatic Complexity, which determines how difficult your code will be to test, Cognitive Complexity tells you how difficult your code will be to read and comprehend.

                A method's cognitive complexity is based on a few simple rules:

                • Code is not considered more complex when it uses shorthand that the language provides for collapsing multiple statements into one
                • Code is considered more complex for each "break in the linear flow of the code"
                • Code is considered more complex when "flow breaking structures are nested"

                Further reading

                Similar blocks of code found in 2 locations. Consider refactoring.
                Open

                  def pid_exists(pid)
                    mypid = client.sys.process.getpid.to_i
                
                    if pid == mypid
                      print_bad('Cannot select the current process as the injection target')
                Severity: Minor
                Found in modules/exploits/windows/local/cve_2020_17136.rb and 1 other location - About 50 mins to fix
                modules/post/windows/manage/reflective_dll_inject.rb on lines 73..89

                Duplicated Code

                Duplicated code can lead to software that is hard to understand and difficult to change. The Don't Repeat Yourself (DRY) principle states:

                Every piece of knowledge must have a single, unambiguous, authoritative representation within a system.

                When you violate DRY, bugs and maintenance problems are sure to follow. Duplicated code has a tendency to both continue to replicate and also to diverge (leaving bugs as two similar implementations differ in subtle ways).

                Tuning

                This issue has a mass of 43.

                We set useful threshold defaults for the languages we support but you may want to adjust these settings based on your project guidelines.

                The threshold configuration represents the minimum mass a code block must have to be analyzed for duplication. The lower the threshold, the more fine-grained the comparison.

                If the engine is too easily reporting duplication, try raising the threshold. If you suspect that the engine isn't catching enough duplication, try lowering the threshold. The best setting tends to differ from language to language.

                See codeclimate-duplication's documentation for more information about tuning the mass threshold in your .codeclimate.yml.

                Refactorings

                Further Reading

                Identical blocks of code found in 2 locations. Consider refactoring.
                Open

                      loop do
                        output = process.channel.read
                        if !output.nil? && !output.empty?
                          output.split("\n").each { |x| print_good(x) }
                        end
                Severity: Minor
                Found in modules/exploits/windows/local/cve_2020_17136.rb and 1 other location - About 25 mins to fix
                modules/post/windows/manage/reflective_dll_inject.rb on lines 191..197

                Duplicated Code

                Duplicated code can lead to software that is hard to understand and difficult to change. The Don't Repeat Yourself (DRY) principle states:

                Every piece of knowledge must have a single, unambiguous, authoritative representation within a system.

                When you violate DRY, bugs and maintenance problems are sure to follow. Duplicated code has a tendency to both continue to replicate and also to diverge (leaving bugs as two similar implementations differ in subtle ways).

                Tuning

                This issue has a mass of 30.

                We set useful threshold defaults for the languages we support but you may want to adjust these settings based on your project guidelines.

                The threshold configuration represents the minimum mass a code block must have to be analyzed for duplication. The lower the threshold, the more fine-grained the comparison.

                If the engine is too easily reporting duplication, try raising the threshold. If you suspect that the engine isn't catching enough duplication, try lowering the threshold. The best setting tends to differ from language to language.

                See codeclimate-duplication's documentation for more information about tuning the mass threshold in your .codeclimate.yml.

                Refactorings

                Further Reading

                There are no issues that match your filters.

                Category
                Status