rapid7 / metasploit-framework

Metasploit Framework
https://www.metasploit.com/
Other
34.03k stars 13.94k forks source link

linux/http/opentsdb_key_cmd_injection doesn't have any compatable payload! #19306

Closed subnetlabs closed 5 days ago

subnetlabs commented 3 months ago

i'm using linux/http/opentsdb_key_cmd_injection exploit i set every option it wants: RHOSTS, LHOST, set the target, but the show payloads command returns nothing.

sisco0 commented 2 months ago

I have observed that the PAYLOAD is currently set to reverse_tcp, which means that we expect to bind a linux meterpreter shell.

Might be @ErikWynter, as module creator, could guide us better in this regard.

mananex commented 2 months ago

I have observed that the PAYLOAD is currently set to reverse_tcp, which means that we expect to bind a linux meterpreter shell.

Might be @ErikWynter, as module creator, could guide us better in this regard.

thanks for the response. I'm writing from my second account.

github-actions[bot] commented 1 month ago

Hi!

This issue has been left open with no activity for a while now.

We get a lot of issues, so we currently close issues after 60 days of inactivity. It’s been at least 30 days since the last update here. If we missed this issue or if you want to keep it open, please reply here. You can also add the label "not stale" to keep this issue open!

As a friendly reminder: the best way to see this issue, or any other, fixed is to open a Pull Request.

github-actions[bot] commented 5 days ago

Hi again!

It’s been 60 days since anything happened on this issue, so we are going to close it. Please keep in mind that I’m only a robot, so if I’ve closed this issue in error please feel free to reopen this issue or create a new one if you need anything else.

As a friendly reminder: the best way to see this issue, or any other, fixed is to open a Pull Request.