Closed cyrus104 closed 4 years ago
I was able to confirm that the requested package, xsltproc, is already installed in Kali.
I'm experiencing this same issue with the xsltproc package installed as well.
Can you tell me the output from the following commands?
uname -a xsltproc --version
Hi, I am experiencing the same issue.
xsltproc --version
Using libxml 20910, libxslt 10132 and libexslt 820 xsltproc was compiled against libxml 20904, libxslt 10132 and libexslt 820 libxslt 10132 was compiled against libxml 20904 libexslt 820 was compiled against libxml 20904
uname -a
Linux kali 5.5.0-kali2-amd64 #1 SMP Debian 5.5.17-1kali1 (2020-04-21) x86_64 GNU/Linux
Same here as well.
xsltproc --version
Using libxml 20910, libxslt 10132 and libexslt 820
xsltproc was compiled against libxml 20904, libxslt 10132 and libexslt 820
libxslt 10132 was compiled against libxml 20904
libexslt 820 was compiled against libxml 20904
uname -a
Linux daemonium 5.4.0-kali3-amd64 #1 SMP Debian 5.4.13-1kali1 (2020-01-20) x86_64 GNU/Linux
The "warning: failed to load external entity "nmap.xsl" cannot parse nmap.xsl" is not going to impact nmap processing. The "--------VULNERS Refreshing EDBID-CVE mapping. This may take a long time. Killed" suggests that it was updating it's vulners database. On slow machines, this can take very long times if the pyExploitDb package is out of date (which ships with predupdated databases to decrease local update time). pyExploitDb was recently updated to fill that update gap. Give it another go.
I'm not sure if the issues is in legion or in the vulners.nse output.
warning: failed to load external entity "nmap.xsl" cannot parse nmap.xsl {"time": "2020-04-10 08:22:55,608", "name": "nmap output export to html attempted, but failed.", "level": "ERROR", "data": {"logger_name": "legion"}, "context": {"module": "DefaultNmapExporter", "filename": "DefaultNmapExporter.py", "line": 39}} {"time": "2020-04-10 08:22:55,609", "name": "Could not convert nmap XML to HTML. Try: apt-get install xsltproc", "level": "ERROR", "data": {"logger_name": "legion"}, "context": {"module": "DefaultNmapExporter", "filename": "DefaultNmapExporter.py", "line": 40}} nmap -sV --script=./scripts/nmap/vulners.nse -vvvv 10.10.10.28 -oA /home/kali/.local/share/legion/tmp/legion-0vu_we50-running/nmap/20200410082206587187-nmapstage3 {"time": "2020-04-10 08:22:55,609", "name": "Process 4 is done!", "level": "INFO", "data": {"logger_name": "legion"}, "context": {"module": "controller", "filename": "controller.py", "line": 834}} {"time": "2020-04-10 08:22:55,621", "name": "Storing process output into db: <db.entities.processOutput.process_output object at 0x7f79f07a0450>", "level": "INFO", "data": {"logger_name": "legion"}, "context": {"module": "ProcessRepository", "filename": "ProcessRepository.py", "line": 76}} Processing script obj <parsers.Script.Script object at 0x7f79f07a0510> Processing script obj <parsers.Script.Script object at 0x7f79f07a01d0> -----------------------SCR: http-server-header -----------------------*http-server-header -----------------------SCR: vulners ------------------------VULNERS Refreshing EDBID-CVE mapping. This may take a long time. Killed