metasploit_data_models 6.0.16 → 6.0.18

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
checksums.yaml CHANGED
@@ -1,7 +1,7 @@
1
1
  ---
2
2
  SHA256:
3
- metadata.gz: bb10f71e1dda20e0a39241b92a614f34719763bc62215cbab6de65c34fde35e5
4
- data.tar.gz: 17caf774dd9c225b97e6d0d341aa8e359dd57917b330b06cca78a49f9f98ff13
3
+ metadata.gz: 691b0db2b20cbd2fbbe42d191d6149ffec950e794a2f50ba7ab6d25bf0aa1af0
4
+ data.tar.gz: 30b0e3e646a40169881acf8d2b78107492573e5dccac8e979c0a5b9e3d78555f
5
5
  SHA512:
6
- metadata.gz: f50617796d4d29b27c4fbca2ed78e2f29051e5c08aed412a9162f2a88d58fb78f27f594007f0da20534b0df97c05427d69d6ffd801fd8a9052de00c5a9939b9d
7
- data.tar.gz: 19f59a7cc28c07f5906cf18f14695863914bad154c2a134d47ca775179b2e571312c50297b1decfd27dc2ba3c11c12b7911ee9ec5149e172616d35e20e59e396
6
+ metadata.gz: 8fb7b65bff2608e6d0d81d982f8854e6b21faa3bea5e6eabc64de5c29d8e5bf9a8d55f38ef37d109242368d68c9cba5ec2a73e5fc6ab91c2f8feedc7a1910eb0
7
+ data.tar.gz: afcdc646d8f65c588e70b2298e5d0089103b7a7b674c37dce3af30cd74fadc63a50503755cce2dd3022ecdfb8567f166251360fab47623f3b21f4e20a79c19b8
@@ -63,6 +63,20 @@ class Mdm::VulnAttempt < ApplicationRecord
63
63
  #
64
64
  # @return [String]
65
65
 
66
+ # @!attribute check_code
67
+ # The check code returned by the module's check method, if this attempt
68
+ # was a vulnerability check rather than an exploitation attempt.
69
+ #
70
+ # @return [String] one of 'vulnerable', 'appears', 'safe', 'detected', 'unknown'
71
+ # @return [nil] if this was an exploitation attempt, not a check
72
+
73
+ # @!attribute check_detail
74
+ # The human-readable message from the module's check method describing
75
+ # why the target was determined to be vulnerable, safe, etc.
76
+ #
77
+ # @return [String] if {#check_code} is present.
78
+ # @return [nil] if this was an exploitation attempt, not a check
79
+
66
80
  # @!attribute username
67
81
  # The {Mdm::User#username name of the user} that made this attempt.
68
82
  #
@@ -0,0 +1,6 @@
1
+ class AddCheckCodeToVulnAttempts < ActiveRecord::Migration[7.0]
2
+ def change
3
+ add_column :vuln_attempts, :check_code, :string
4
+ add_column :vuln_attempts, :check_detail, :text
5
+ end
6
+ end
@@ -1,7 +1,7 @@
1
1
  #
2
2
  # Leverage the Recog gem as much as possible for sane fingerprint management
3
3
  #
4
- require 'recog'
4
+
5
5
 
6
6
  #
7
7
  # Rules for operating system fingerprinting in Metasploit
@@ -1,6 +1,6 @@
1
1
  module MetasploitDataModels
2
2
  # VERSION is managed by GemRelease
3
- VERSION = '6.0.16'
3
+ VERSION = '6.0.18'
4
4
 
5
5
  # @return [String]
6
6
  #
@@ -26,6 +26,7 @@ require 'arel-helpers'
26
26
  require 'metasploit_data_models/version'
27
27
 
28
28
  autoload :Mdm, 'mdm'
29
+ autoload :Recog, 'recog'
29
30
 
30
31
  # Core database models for metasploit-framework.
31
32
  module MetasploitDataModels
@@ -20,6 +20,8 @@ RSpec.describe Mdm::VulnAttempt, type: :model do
20
20
  it { is_expected.to have_db_column(:session_id).of_type(:integer) }
21
21
  it { is_expected.to have_db_column(:loot_id).of_type(:integer) }
22
22
  it { is_expected.to have_db_column(:fail_detail).of_type(:text) }
23
+ it { is_expected.to have_db_column(:check_code).of_type(:string) }
24
+ it { is_expected.to have_db_column(:check_detail).of_type(:text) }
23
25
  end
24
26
  end
25
27
 
@@ -1755,7 +1755,9 @@ CREATE TABLE public.vuln_attempts (
1755
1755
  module text,
1756
1756
  session_id integer,
1757
1757
  loot_id integer,
1758
- fail_detail text
1758
+ fail_detail text,
1759
+ check_code character varying,
1760
+ check_detail text
1759
1761
  );
1760
1762
 
1761
1763
 
@@ -3602,6 +3604,7 @@ INSERT INTO "schema_migrations" (version) VALUES
3602
3604
  ('20250721114306'),
3603
3605
  ('20251231162000'),
3604
3606
  ('20260130124052'),
3607
+ ('20260411000000'),
3605
3608
  ('21'),
3606
3609
  ('22'),
3607
3610
  ('23'),
metadata CHANGED
@@ -1,14 +1,14 @@
1
1
  --- !ruby/object:Gem::Specification
2
2
  name: metasploit_data_models
3
3
  version: !ruby/object:Gem::Version
4
- version: 6.0.16
4
+ version: 6.0.18
5
5
  platform: ruby
6
6
  authors:
7
7
  - Metasploit Hackers
8
8
  autorequire:
9
9
  bindir: bin
10
10
  cert_chain: []
11
- date: 2026-04-14 00:00:00.000000000 Z
11
+ date: 2026-04-21 00:00:00.000000000 Z
12
12
  dependencies:
13
13
  - !ruby/object:Gem::Dependency
14
14
  name: metasploit-yard
@@ -535,6 +535,7 @@ files:
535
535
  - db/migrate/20250721114306_remove_duplicate_services3.rb
536
536
  - db/migrate/20251231162000_add_session_tags.rb
537
537
  - db/migrate/20260130124052_add_sso_status_to_user.rb
538
+ - db/migrate/20260411000000_add_check_code_to_vuln_attempts.rb
538
539
  - lib/mdm.rb
539
540
  - lib/mdm/host/operating_system_normalization.rb
540
541
  - lib/mdm/module.rb