-
Notifications
You must be signed in to change notification settings - Fork 14.1k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Log4Shell fails due to bad-config #18836
Comments
@Cx01N could you run |
|
Tracked down the issue to this code change here: https://github.com/rapid7/metasploit-framework/pull/18596/files#diff-23d2aec817fcb1bc81721d5ee0c240e2b088f2b2cd0158260bdd2387b803f8c5L11-R11 The change is actually fixing a bug which as it turns out happened to let this module run but since when we take a look at what's in this module's |
Replaced || with && in the assignments for the self.passive attribute to avoid setting it to false when info['Passive'] is false |
Hi! This issue has been left open with no activity for a while now. We get a lot of issues, so we currently close issues after 60 days of inactivity. It’s been at least 30 days since the last update here. As a friendly reminder: the best way to see this issue, or any other, fixed is to open a Pull Request. |
Probably dont want to let this get closed as stale, that's a bug worth fixing |
My bad, assigned it to work on and didn't add the label |
Steps to reproduce
How'd you do it?
This section should also tell us any relevant information about the
environment; for example, if an exploit that used to work is failing,
tell us the victim operating system and service versions.
Were you following a specific guide/tutorial or reading documentation?
No
If yes link the guide/tutorial or documentation you were following here, otherwise you may omit this section.
Expected behavior
I tested the module on an older copy of log4shell with Metasploit v6.3.51 and was able to get the exploit to work.
What should happen?
The exploit should return a shell to the metasplit.
Current behavior
What happens instead?
The module reports "exploit aborted due to failure: bad config"
Metasploit version
Framework: 6.3.55-dev
Console : 6.3.55-dev
Get this with the
version
command in msfconsole (orgit log -1 --pretty=oneline
for a source install).Additional Information
Module/Datastore
The following global/module datastore, and database setup was configured before the issue occurred:
Collapse
Database Configuration
The database contains the following information:
Collapse
History
The following commands were ran during the session and before this issue occurred:
Collapse
Framework Errors
The following framework errors occurred before the issue occurred:
Collapse
Web Service Errors
The following web service errors occurred before the issue occurred:
Collapse
Framework Logs
The following framework logs were recorded before the issue occurred:
Collapse
Web Service Logs
The following web service logs were recorded before the issue occurred:
Collapse
Version/Install
The versions and install method of your Metasploit setup:
Collapse
The text was updated successfully, but these errors were encountered: