rapid7/metasploit_data_models

View on GitHub
app/models/mdm/vuln.rb

Summary

Maintainability
A
0 mins
Test Coverage
# A vulnerability found on a {#host} or {#service}.
class Mdm::Vuln < ApplicationRecord

  #
  # Associations
  #

  # @!attribute exploit_attempts
  #   Attempts to exploit this vulnerability.
  #
  #   @return [ActiveRecord::Relation<Mdm::ExploitAttempt>]
  has_many :exploit_attempts,
           class_name: 'Mdm::ExploitAttempt',
           inverse_of: :vuln

  # @!attribute [rw] host
  #   The host with this vulnerability.
  #
  #   @return [Mdm::Host]
  belongs_to :host,
             class_name: 'Mdm::Host',
             counter_cache: :vuln_count,
             optional: true,
             inverse_of: :vulns

  # @!attribute [rw] matches
  #   The matches for this vuln
  #
  #   @return [ActiveRecord::Relation<MetasploitDataModels::AutomaticExploitation::Match>]
  has_many :matches, class_name: "MetasploitDataModels::AutomaticExploitation::Match",
           as: :matchable,
           dependent: :destroy

  # @!attribute [rw] service
  #   The service with the vulnerability.
  #
  #   @return [Mdm::Service]
  belongs_to :service,
             class_name: 'Mdm::Service',
             optional: true,
             inverse_of: :vulns

  # @!attribute [rw] origin
  #   A polymorphic association to the origin that found
  #   the vulnerability.
  #
  #   @return [ActiveRecord::Relation<origin>]
  belongs_to :origin,
             optional: true,
             polymorphic: true

  # @!attribute [rw] vuln_attempts
  #   Attempts to exploit this vulnerability.
  #
  #   @return [ActiveRecord::Relation<Mdm::VulnAttempt>]
  has_many :vuln_attempts,
           class_name: 'Mdm::VulnAttempt',
           dependent: :destroy,
           inverse_of: :vuln

  # @!attribute [rw] vuln_details
  #   Additional information about this vulnerability.
  #
  #   @return [ActiveRecord::Relation<Mdm::VulnDetail>]
  has_many :vuln_details,
           class_name: 'Mdm::VulnDetail',
           dependent: :destroy,
           inverse_of: :vuln

  # @!attribute [rw] vulns_refs
  #   Join model that joins this vuln to its {Mdm::Ref external references}.
  #
  #   @return [ActiveRecord::Relation<Mdm::VulnRef>]
  has_many :vulns_refs,
           class_name: 'Mdm::VulnRef',
           dependent: :destroy,
           inverse_of: :vuln

  # @!attribute [rw] notes
  #   Notes about the vuln entered by a user with {Mdm::Note#created_at oldest notes} first.
  #
  #   @return [<ActiveRecord::RelationMdm::Note>]
  has_many :notes,
           -> { order('notes.created_at') },
           class_name: 'Mdm::Note',
           inverse_of: :vuln,
           dependent: :delete_all


  #
  # Through :vuln_refs
  #

  # @!attribute [r] refs
  #   External references to this vulnerability.
  #
  #   @return [ActiveRecord::Relation<Mdm::Ref>]
  has_many :refs, :class_name => 'Mdm::Ref', :through => :vulns_refs

  #
  #  Through refs
  #

  # @!attribute [r] module_refs
  #   References in module that match {Mdm::Ref#name names} in {#refs}.
  #
  #   @return [ActiveRecord::Relation<Mdm::Module::Ref>]
  has_many :module_refs, :class_name => 'Mdm::Module::Ref', :through => :refs


  # @!attribute [r] module_runs
  #   References to times that a module has been run to exercise this vuln
  #
  #   @return [ActiveRecord::Relation<MetasploitDataModels::ModuleRun>]
  has_many :module_runs,
           class_name: 'MetasploitDataModels::ModuleRun',
           as: :trackable

  #
  # Through module_refs
  #

  # @!attribute [r] module_details
  #   {Mdm::Module::Detail Modules} that share the same external references as this vuln.
  #
  #   @return [ActiveRecord::Relation<Mdm::Module::Detail>]
  has_many :module_details,
            -> { distinct },
            :class_name => 'Mdm::Module::Detail',
            :source => :detail,
            :through => :module_refs


  #
  # Attributes
  #

  # @!attribute [rw] exploited_at
  #   When the vulnerability was exploited
  #
  #   @return [DateTime]

  # @!attribute [rw] name
  #   The name of the vulnerability in metasploit-framework or from the import source.
  #
  #   @return [String]

  # @!attribute [rw] info
  #   Additional information about the vulnerability
  #
  #   @return [String]

  # @!attribute [rw] vuln_attempt_count
  #   Counter cache for number of {#vuln_attempts}.
  #
  #   @return [Integer]

  # @!attribute [rw] vuln_detail_count
  #   Counter cache for number of {#vuln_details}.
  #
  #   @return [Integer]

  #
  # Callbacks
  #

  after_update :save_refs

  #
  # Scopes
  #

  scope :search, lambda { |query|
    formatted_query = "%#{query}%"
    where(
      arel_table[:name].matches(formatted_query).or(
        arel_table[:info].matches(formatted_query)
      ).or(
        Mdm::Ref.arel_table[:name].matches(formatted_query)
      ).or(
        Arel::Nodes::NamedFunction.new('CAST', [Mdm::Host.arel_table[:address].as('TEXT')]).matches(formatted_query)
      ).or(
        Mdm::Host.arel_table[:name].matches(formatted_query)
      )
    ).includes(
      :refs, :host
    ).references(:refs,:host)
  }

  #
  # Validations
  #

  validates :name, :presence => true
  validates :name, length: {maximum: 255}
  validates_associated :refs

  private

  def save_refs
    refs.each { |ref| ref.save(:validate => false) }
  end

  public

  Metasploit::Concern.run(self)
end