Hackman238 / legion

Legion is an open source, easy-to-use, super-extensible and semi-automated network penetration testing tool that aids in discovery, reconnaissance and exploitation of information systems.
GNU General Public License v3.0
8 stars 0 forks source link

list index out of range #25

Open Hackman238 opened 4 weeks ago

Hackman238 commented 4 weeks ago

Hi,

Linux k21 5.15.0-kali2-amd64 #1 SMP Debian 5.15.5-2kali2 (2021-12-22) x86_64 GNU/Linux

Legion last version from git 11/02/2022 ver 0.3.8-1622657874

-oA ./tmp/legion-nato5awb-running/nmap/20220211100031722541-nmapstage3 {"time": "2022-02-11 10:01:19,620", "name": "Process 76 is done!", "level": "INFO", "data": {"logger_name": "legion"}, "context": {"module": "controller", "filename": "controller.py", "line": 839}} Processing service result name=domain prod=ISC BIND ver=9.11.4-P2 extra=RedHat Enterprise Linux 7 fing= Did not find service name=domain prod=ISC BIND ver=9.11.4-P2 extra=RedHat Enterprise Linux 7 fing= Processing service result name=ident prod= ver= extra= fing= Did not find service name=ident prod= ver= extra= fing= Processing script obj <parsers.Script.Script object at 0x7fbd652b2a60> -----------------------SCR: vulners ------------------------VULNERS Loading database... Traceback (most recent call last): File "/root/tools/legion/app/importers/NmapImporter.py", line 283, in run scrProcessorResults = scr.scriptSelector(db_host) File "/root/tools/legion/parsers/Script.py", line 122, in scriptSelector cveResults = self.getCves() File "/root/tools/legion/parsers/Script.py", line 96, in getCves cvesResults = self.processVulnersScriptOutput(cveOutput) File "/root/tools/legion/parsers/Script.py", line 66, in processVulnersScriptOutput resultCpeDetails['version'] = resultCpeData[4] IndexError: list index out of range ./startLegion.sh: line 38: 2172947 Aborted /usr/bin/env python3 legion.py

Please just let me know if more info is needed.

thks!