rapid7/metasploit-framework

View on GitHub
modules/exploits/windows/scada/advantech_webaccess_webvrpcs_bof.rb

Summary

Maintainability
B
4 hrs
Test Coverage

Method exploit has 41 lines of code (exceeds 25 allowed). Consider refactoring.
Open

  def exploit
    connect
    handle = dcerpc_handle('5d2b62aa-ee0a-4a95-91ae-b064fdb471fc', '1.0', 'ncacn_ip_tcp', [datastore['RPORT']])
    print_status("Binding to #{handle} ...")
    dcerpc_bind(handle)
Severity: Minor
Found in modules/exploits/windows/scada/advantech_webaccess_webvrpcs_bof.rb - About 1 hr to fix

    Method initialize has 39 lines of code (exceeds 25 allowed). Consider refactoring.
    Open

      def initialize(info = {})
        super(update_info(info,
          'Name'           => 'Advantech WebAccess Webvrpcs Service Opcode 80061 Stack Buffer Overflow',
          'Description'    => %q{
              This module exploits a stack buffer overflow in Advantech WebAccess 8.2.
    Severity: Minor
    Found in modules/exploits/windows/scada/advantech_webaccess_webvrpcs_bof.rb - About 1 hr to fix

      Method create_rop_chain has 32 lines of code (exceeds 25 allowed). Consider refactoring.
      Open

        def create_rop_chain()
      
          # this target opts into dep
          rop_gadgets =
          [
      Severity: Minor
      Found in modules/exploits/windows/scada/advantech_webaccess_webvrpcs_bof.rb - About 1 hr to fix

        There are no issues that match your filters.

        Category
        Status