rapid7 / metasploit-framework

Metasploit Framework
https://www.metasploit.com/
Other
34.32k stars 14.02k forks source link

auxiliary/scanner/ssl/openssl_heartbleed #11499

Closed chokfulla closed 5 years ago

chokfulla commented 5 years ago

Steps to reproduce

How'd you do it?

Within msfconsole...

  1. use scanner/ssl/openssl_heartbleed
  2. set RHOSTS xxx.xxx.xxx.xxx
  3. set RPORT xxxx
  4. set ACTION SCAN (I receive the same error regardless of whether I set this option to SCAN, DUMP, KEYS or just leave default)
  5. show actions (verified actions)
  6. show options (verified options)
  7. run

This section should also tell us any relevant information about the environment; for example, if an exploit that used to work is failing, tell us the victim operating system and service versions.

Expected behavior

What should happen?

scanner should run using given variables

Current behavior

What happens instead?

I receive this output [-] Auxiliary failed: Msf::MissingActionError Invalid action: Please use: SCAN, DUMP, KEYS [-] Call stack:

You might also want to check the last ~1k lines of /opt/metasploit/apps/pro/engine/config/logs/framework.log or ~/.msf4/logs/framework.log for relevant stack traces

Nothing relevant there.

System stuff

Metasploit version

Get this with the version command in msfconsole (or git log -1 --pretty=oneline for a source install).

Framework: 5.0.8-dev Console : 5.0.8-dev

I installed Metasploit with:

OS

What OS are you running Metasploit on?

Kali Rolling (latest updates as of 28 Feb 2019)

wvu commented 5 years ago

This should be fixed as of #11486.

tjnull commented 5 years ago

The Kali Linux Dev Team has pushed out the new Metasploit Update today.

https://pkg.kali.org/pkg/metasploit-framework

Please use apt-get update to update to the latest repo and apt-get upgrade to upgrade to the latest metasploit package.