andresriancho / w3af

w3af: web application attack and audit framework, the open source web vulnerability scanner.
http://w3af.org/
4.57k stars 1.22k forks source link

Exploiting all vulnerabilities: sqlmap not found #2540

Closed 1d3df9903ad closed 10 years ago

1d3df9903ad commented 10 years ago

Version Information

  Python version: 2.7.6 (default, May  9 2014, 23:05:44) [GCC 4.8.2]
  GTK version: 2.24.23
  PyGTK version: 2.24.0
  w3af version:
    w3af - Web Application Attack and Audit Framework
    Version: 1.6
    Revision: unknown
    Branch: unknown
    Local changes: No
    Author: Andres Riancho and the w3af team.

Traceback

Traceback (most recent call last):
  File "/usr/lib64/w3af/w3af/core/ui/gui/tabs/exploit/exploit_all.py", line 167, in _launch_exploit_all
    exploit.exploit()
  File "/usr/lib64/w3af/w3af/core/controllers/plugins/attack_plugin.py", line 198, in exploit
    s = self._generate_shell(vuln)
  File "/usr/lib64/w3af/w3af/plugins/attack/sqlmap.py", line 77, in _generate_shell
    if self._verify_vuln(vuln_obj):
  File "/usr/lib64/w3af/w3af/plugins/attack/sqlmap.py", line 106, in _verify_vuln
    if sqlmap.is_vulnerable():
  File "/usr/lib64/w3af/w3af/plugins/attack/db/sqlmap_wrapper.py", line 83, in is_vulnerable
    full_command, stdout, stderr = self.run_sqlmap(params)
  File "/usr/lib64/w3af/w3af/plugins/attack/db/sqlmap_wrapper.py", line 138, in run_sqlmap
    process = self._run(custom_params)
  File "/usr/lib64/w3af/w3af/plugins/attack/db/sqlmap_wrapper.py", line 120, in _run
    cwd=self.SQLMAP_LOCATION)
  File "/usr/lib64/python2.7/subprocess.py", line 709, in __init__
    errread, errwrite)
  File "/usr/lib64/python2.7/subprocess.py", line 1326, in _execute_child
    raise child_exception
OSError: [Errno 2] No such file or directory: '/usr/lib64/w3af/w3af/plugins/attack/db/sqlmap'
andresriancho commented 10 years ago

Nobody else reported this, so closing.