rastating/wordpress-exploit-framework

View on GitHub
lib/wpxf/modules/auxiliary/file_download/duplicator_csrf_db_export.rb

Summary

Maintainability
A
2 hrs
Test Coverage

Method page_script has 39 lines of code (exceeds 25 allowed). Consider refactoring.
Open

  def page_script
    func1 = Utility::Text.rand_alpha(rand(5..10))
    func2 = Utility::Text.rand_alpha(rand(5..10))
    %|
      debugger;

    Method initialize has 34 lines of code (exceeds 25 allowed). Consider refactoring.
    Open

      def initialize
        super
    
        update_info(
          name: 'Duplicator <= 1.1.3 CSRF Database Export',

      Line is too long. [188/180]
      Open

              var body = "action=&package-hash=#{package_hash}&package-name=#{package_name}&package-notes=&archive-format=ZIP&filter-dirs=&filter-exts=&dbhost=&dbport=&dbname=&dbuser=&url-new=";

      There are no issues that match your filters.

      Category
      Status