-
Notifications
You must be signed in to change notification settings - Fork 14.1k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
module windows/dcerpc/cve_2021_1675_printnightmare - Exploit failed: NoMethodError undefined method `call' for nil:NilClass #19123
Comments
Could you run |
Module/DatastoreThe following global/module datastore, and database setup was configured before the issue occurred: Collapse
Database ConfigurationThe database contains the following information: Collapse
HistoryThe following commands were ran during the session and before this issue occurred: Collapse
Framework ErrorsThe following framework errors occurred before the issue occurred: Collapse
Web Service ErrorsThe following web service errors occurred before the issue occurred: Collapse
Framework LogsThe following framework logs were recorded before the issue occurred: Collapse
Web Service LogsThe following web service logs were recorded before the issue occurred: Collapse
Version/InstallThe versions and install method of your Metasploit setup: Collapse
|
Looks like the exploit method assumes that the As far as I can see from the error message, either the RHOST is wrong or the target's SMB isn't accessible? |
I tried this both against my localhost and a remote windows computer, getting the same error. It is possible that's the case. |
Hi! This issue has been left open with no activity for a while now. We get a lot of issues, so we currently close issues after 60 days of inactivity. It’s been at least 30 days since the last update here. As a friendly reminder: the best way to see this issue, or any other, fixed is to open a Pull Request. |
Hi again! It’s been 60 days since anything happened on this issue, so we are going to close it. As a friendly reminder: the best way to see this issue, or any other, fixed is to open a Pull Request. |
Operating system: installed via kali apt repository on kali linux.
expected behavior:
exploit runs and interacts with target machine
current:
exploit crashes after running. I've also ran this against remote windows machines with the same result
version:
what I ran:
debug output:
Module/Datastore
The following global/module datastore, and database setup was configured before the issue occurred:
Collapse
Database Configuration
The database contains the following information:
Collapse
History
The following commands were ran during the session and before this issue occurred:
Collapse
Framework Errors
The following framework errors occurred before the issue occurred:
Collapse
Web Service Errors
The following web service errors occurred before the issue occurred:
Collapse
Framework Logs
The following framework logs were recorded before the issue occurred:
Collapse
Web Service Logs
The following web service logs were recorded before the issue occurred:
Collapse
Version/Install
The versions and install method of your Metasploit setup:
Collapse
The text was updated successfully, but these errors were encountered: