rastating/wordpress-exploit-framework

View on GitHub
lib/wpxf/modules/exploit/xss/reflected/lightbox_reflected_xss_shell_upload.rb

Summary

Maintainability
A
1 hr
Test Coverage

Method initial_script has 32 lines of code (exceeds 25 allowed). Consider refactoring.
Open

  def initial_script
    create_basic_post_script(
      vulnerable_url,
      'light_box_style' => '1',
      'light_box_transition' => 'elastic',

    Unnecessary spacing detected.
    Open

            'rastating'  # WPXF module

    This cop checks for extra/unnecessary whitespace.

    Example:

    # good if AllowForAlignment is true
    name      = "RuboCop"
    # Some comment and an empty line
    
    website  += "/bbatsov/rubocop" unless cond
    puts        "rubocop"          if     debug
    
    # bad for any configuration
    set_app("RuboCop")
    website  = "https://github.com/bbatsov/rubocop"

    There are no issues that match your filters.

    Category
    Status