-
Notifications
You must be signed in to change notification settings - Fork 91
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
client.modules.use("exploit","exploit/linux/misc/saltstack_salt_unauth_rce") #54
Comments
Socket seems to be waiting for data. Did run into same problem. And here is stack trace of what's happening
|
After some research in code, it seems like this is a metasploit issue. |
Agree. We have to skip this exploit when getting the exploit info. |
I haven't tested it; but I believe this might be fixed by rapid7/metasploit-framework#15686 |
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
can not get result ,msfrpcd in metasploit v5.0.101-dev.
The text was updated successfully, but these errors were encountered: