Skip to content

Commit 83963d1

Browse files
committed
Set the workspace when reporting
1 parent 02e3a55 commit 83963d1

File tree

2 files changed

+5
-3
lines changed

2 files changed

+5
-3
lines changed

lib/msf/core/auxiliary/report.rb

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -307,13 +307,14 @@ def report_vuln(opts={})
307307

308308
# report_vuln is only called in an identified case, consider setting value reported here
309309
attempt_info = {
310+
:workspace => opts[:workspace],
310311
:vuln_id => vuln.id,
311312
:attempted_at => timestamp || Time.now.utc,
312313
:exploited => false,
313314
:fail_detail => 'vulnerability identified',
314315
:fail_reason => 'Untried', # Mdm::VulnAttempt::Status::UNTRIED, avoiding direct dependency on Mdm, used elsewhere in this module
315316
:module => mname,
316-
:username => username || "unknown",
317+
:username => username || "unknown"
317318
}
318319

319320
# TODO: figure out what opts are required and why the above logic doesn't match that of the db_manager method

modules/auxiliary/gather/ldap_esc_vulnerable_cert_finder.rb

Lines changed: 3 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -616,16 +616,17 @@ def print_vulnerable_cert_info
616616
info = nil if info.blank?
617617

618618
hash[:ca_servers].each_value do |ca_server|
619-
service = report_service({
619+
service = report_service(
620620
host: ca_server[:ip_address],
621621
port: 445,
622622
proto: 'tcp',
623623
name: 'AD CS',
624624
info: "AD CS CA name: #{ca_server[:name]}"
625-
})
625+
)
626626

627627
if ca_server[:ip_address].present?
628628
vuln = report_vuln(
629+
workspace: myworkspace,
629630
host: ca_server[:ip_address],
630631
port: 445,
631632
proto: 'tcp',

0 commit comments

Comments
 (0)