Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Problem reporting website: opts must include a valid :workspace. #10999

Closed
1 of 4 tasks
oytunistrator opened this issue Nov 21, 2018 · 3 comments
Closed
1 of 4 tasks

Problem reporting website: opts must include a valid :workspace. #10999

oytunistrator opened this issue Nov 21, 2018 · 3 comments

Comments

@oytunistrator
Copy link

oytunistrator commented Nov 21, 2018

Steps to reproduce

  1. workspace -a lab1
  2. load wmap
  3. wmap_sites -a http://site.....

Current behavior

[-] Error while running command wmap_sites: Problem reporting website: opts must include a valid :workspace. See log for more details.

Call stack:
/home/oytun/pentest/exploits/metasploit-framework/lib/metasploit/framework/data_service/proxy/core.rb:174:in `log_error'
/home/oytun/pentest/exploits/metasploit-framework/lib/metasploit/framework/data_service/proxy/web_data_proxy.rb:8:in `rescue in report_web_site'
/home/oytun/pentest/exploits/metasploit-framework/lib/metasploit/framework/data_service/proxy/web_data_proxy.rb:2:in `report_web_site'
/home/oytun/pentest/exploits/metasploit-framework/plugins/wmap.rb:1347:in `add_web_site'
/home/oytun/pentest/exploits/metasploit-framework/plugins/wmap.rb:132:in `cmd_wmap_sites'
/home/oytun/pentest/exploits/metasploit-framework/lib/rex/ui/text/dispatcher_shell.rb:502:in `run_command'
/home/oytun/pentest/exploits/metasploit-framework/lib/rex/ui/text/dispatcher_shell.rb:453:in `block in run_single'
/home/oytun/pentest/exploits/metasploit-framework/lib/rex/ui/text/dispatcher_shell.rb:447:in `each'
/home/oytun/pentest/exploits/metasploit-framework/lib/rex/ui/text/dispatcher_shell.rb:447:in `run_single'
/home/oytun/pentest/exploits/metasploit-framework/lib/rex/ui/text/shell.rb:151:in `run'
/home/oytun/pentest/exploits/metasploit-framework/lib/metasploit/framework/command/console.rb:48:in `start'
/home/oytun/pentest/exploits/metasploit-framework/lib/metasploit/framework/command/base.rb:82:in `start'
/home/oytun/pentest/exploits/metasploit-framework/msfconsole:49:in `<main>'

~/.msf4/logs$ cat framework.log;

[11/21/2018 11:49:09] [d(0)] core: Created user based module store
[11/21/2018 11:49:59] [e(0)] core: Problem reporting website: opts must include a valid :workspace
[11/21/2018 11:49:59] [e(0)] core: /home/oytun/pentest/exploits/metasploit-framework/lib/msf/util/db_manager.rb:35:in `process_opts_workspace'
[11/21/2018 11:49:59] [e(0)] core: /home/oytun/pentest/exploits/metasploit-framework/lib/msf/core/db_manager/web.rb:191:in `block in report_web_site'
[11/21/2018 11:49:59] [e(0)] core: /var/lib/gems/2.5.0/gems/activerecord-4.2.10/lib/active_record/connection_adapters/abstract/connection_pool.rb:292:in `with_connection'
[11/21/2018 11:49:59] [e(0)] core: /home/oytun/pentest/exploits/metasploit-framework/lib/msf/core/db_manager/web.rb:190:in `report_web_site'
[11/21/2018 11:49:59] [e(0)] core: /home/oytun/pentest/exploits/metasploit-framework/lib/metasploit/framework/data_service/proxy/web_data_proxy.rb:5:in `block in report_web_site'
[11/21/2018 11:49:59] [e(0)] core: /home/oytun/pentest/exploits/metasploit-framework/lib/metasploit/framework/data_service/proxy/core.rb:166:in `data_service_operation'
[11/21/2018 11:49:59] [e(0)] core: /home/oytun/pentest/exploits/metasploit-framework/lib/metasploit/framework/data_service/proxy/web_data_proxy.rb:4:in `report_web_site'
[11/21/2018 11:49:59] [e(0)] core: /home/oytun/pentest/exploits/metasploit-framework/plugins/wmap.rb:1347:in `add_web_site'
[11/21/2018 11:49:59] [e(0)] core: /home/oytun/pentest/exploits/metasploit-framework/plugins/wmap.rb:132:in `cmd_wmap_sites'
[11/21/2018 11:49:59] [e(0)] core: /home/oytun/pentest/exploits/metasploit-framework/lib/rex/ui/text/dispatcher_shell.rb:502:in `run_command'
[11/21/2018 11:49:59] [e(0)] core: /home/oytun/pentest/exploits/metasploit-framework/lib/rex/ui/text/dispatcher_shell.rb:453:in `block in run_single'
[11/21/2018 11:49:59] [e(0)] core: /home/oytun/pentest/exploits/metasploit-framework/lib/rex/ui/text/dispatcher_shell.rb:447:in `each'
[11/21/2018 11:49:59] [e(0)] core: /home/oytun/pentest/exploits/metasploit-framework/lib/rex/ui/text/dispatcher_shell.rb:447:in `run_single'
[11/21/2018 11:49:59] [e(0)] core: /home/oytun/pentest/exploits/metasploit-framework/lib/rex/ui/text/shell.rb:151:in `run'
[11/21/2018 11:49:59] [e(0)] core: /home/oytun/pentest/exploits/metasploit-framework/lib/metasploit/framework/command/console.rb:48:in `start'
[11/21/2018 11:49:59] [e(0)] core: /home/oytun/pentest/exploits/metasploit-framework/lib/metasploit/framework/command/base.rb:82:in `start'
[11/21/2018 11:49:59] [e(0)] core: /home/oytun/pentest/exploits/metasploit-framework/msfconsole:49:in `<main>'
[11/21/2018 11:50:22] [e(0)] core: Problem reporting website: opts must include a valid :workspace
[11/21/2018 11:50:22] [e(0)] core: /home/oytun/pentest/exploits/metasploit-framework/lib/msf/util/db_manager.rb:35:in `process_opts_workspace'
[11/21/2018 11:50:22] [e(0)] core: /home/oytun/pentest/exploits/metasploit-framework/lib/msf/core/db_manager/web.rb:191:in `block in report_web_site'
[11/21/2018 11:50:22] [e(0)] core: /var/lib/gems/2.5.0/gems/activerecord-4.2.10/lib/active_record/connection_adapters/abstract/connection_pool.rb:292:in `with_connection'
[11/21/2018 11:50:22] [e(0)] core: /home/oytun/pentest/exploits/metasploit-framework/lib/msf/core/db_manager/web.rb:190:in `report_web_site'
[11/21/2018 11:50:22] [e(0)] core: /home/oytun/pentest/exploits/metasploit-framework/lib/metasploit/framework/data_service/proxy/web_data_proxy.rb:5:in `block in report_web_site'
[11/21/2018 11:50:22] [e(0)] core: /home/oytun/pentest/exploits/metasploit-framework/lib/metasploit/framework/data_service/proxy/core.rb:166:in `data_service_operation'
[11/21/2018 11:50:22] [e(0)] core: /home/oytun/pentest/exploits/metasploit-framework/lib/metasploit/framework/data_service/proxy/web_data_proxy.rb:4:in `report_web_site'
[11/21/2018 11:50:22] [e(0)] core: /home/oytun/pentest/exploits/metasploit-framework/plugins/wmap.rb:1347:in `add_web_site'
[11/21/2018 11:50:22] [e(0)] core: /home/oytun/pentest/exploits/metasploit-framework/plugins/wmap.rb:132:in `cmd_wmap_sites'
[11/21/2018 11:50:22] [e(0)] core: /home/oytun/pentest/exploits/metasploit-framework/lib/rex/ui/text/dispatcher_shell.rb:502:in `run_command'
[11/21/2018 11:50:22] [e(0)] core: /home/oytun/pentest/exploits/metasploit-framework/lib/rex/ui/text/dispatcher_shell.rb:453:in `block in run_single'
[11/21/2018 11:50:22] [e(0)] core: /home/oytun/pentest/exploits/metasploit-framework/lib/rex/ui/text/dispatcher_shell.rb:447:in `each'
[11/21/2018 11:50:22] [e(0)] core: /home/oytun/pentest/exploits/metasploit-framework/lib/rex/ui/text/dispatcher_shell.rb:447:in `run_single'
[11/21/2018 11:50:22] [e(0)] core: /home/oytun/pentest/exploits/metasploit-framework/lib/rex/ui/text/shell.rb:151:in `run'
[11/21/2018 11:50:22] [e(0)] core: /home/oytun/pentest/exploits/metasploit-framework/lib/metasploit/framework/command/console.rb:48:in `start'
[11/21/2018 11:50:22] [e(0)] core: /home/oytun/pentest/exploits/metasploit-framework/lib/metasploit/framework/command/base.rb:82:in `start'
[11/21/2018 11:50:22] [e(0)] core: /home/oytun/pentest/exploits/metasploit-framework/msfconsole:49:in `<main>'
[11/21/2018 11:52:09] [e(0)] core: Problem reporting website: opts must include a valid :workspace
[11/21/2018 11:52:09] [e(0)] core: /home/oytun/pentest/exploits/metasploit-framework/lib/msf/util/db_manager.rb:35:in `process_opts_workspace'
[11/21/2018 11:52:09] [e(0)] core: /home/oytun/pentest/exploits/metasploit-framework/lib/msf/core/db_manager/web.rb:191:in `block in report_web_site'
[11/21/2018 11:52:09] [e(0)] core: /var/lib/gems/2.5.0/gems/activerecord-4.2.10/lib/active_record/connection_adapters/abstract/connection_pool.rb:292:in `with_connection'
[11/21/2018 11:52:09] [e(0)] core: /home/oytun/pentest/exploits/metasploit-framework/lib/msf/core/db_manager/web.rb:190:in `report_web_site'
[11/21/2018 11:52:09] [e(0)] core: /home/oytun/pentest/exploits/metasploit-framework/lib/metasploit/framework/data_service/proxy/web_data_proxy.rb:5:in `block in report_web_site'
[11/21/2018 11:52:09] [e(0)] core: /home/oytun/pentest/exploits/metasploit-framework/lib/metasploit/framework/data_service/proxy/core.rb:166:in `data_service_operation'
[11/21/2018 11:52:09] [e(0)] core: /home/oytun/pentest/exploits/metasploit-framework/lib/metasploit/framework/data_service/proxy/web_data_proxy.rb:4:in `report_web_site'
[11/21/2018 11:52:09] [e(0)] core: /home/oytun/pentest/exploits/metasploit-framework/plugins/wmap.rb:1347:in `add_web_site'
[11/21/2018 11:52:09] [e(0)] core: /home/oytun/pentest/exploits/metasploit-framework/plugins/wmap.rb:132:in `cmd_wmap_sites'
[11/21/2018 11:52:09] [e(0)] core: /home/oytun/pentest/exploits/metasploit-framework/lib/rex/ui/text/dispatcher_shell.rb:502:in `run_command'
[11/21/2018 11:52:09] [e(0)] core: /home/oytun/pentest/exploits/metasploit-framework/lib/rex/ui/text/dispatcher_shell.rb:453:in `block in run_single'
[11/21/2018 11:52:09] [e(0)] core: /home/oytun/pentest/exploits/metasploit-framework/lib/rex/ui/text/dispatcher_shell.rb:447:in `each'
[11/21/2018 11:52:09] [e(0)] core: /home/oytun/pentest/exploits/metasploit-framework/lib/rex/ui/text/dispatcher_shell.rb:447:in `run_single'
[11/21/2018 11:52:09] [e(0)] core: /home/oytun/pentest/exploits/metasploit-framework/lib/rex/ui/text/shell.rb:151:in `run'
[11/21/2018 11:52:09] [e(0)] core: /home/oytun/pentest/exploits/metasploit-framework/lib/metasploit/framework/command/console.rb:48:in `start'
[11/21/2018 11:52:09] [e(0)] core: /home/oytun/pentest/exploits/metasploit-framework/lib/metasploit/framework/command/base.rb:82:in `start'
[11/21/2018 11:52:09] [e(0)] core: /home/oytun/pentest/exploits/metasploit-framework/msfconsole:49:in `<main>'
[11/21/2018 11:55:38] [e(0)] core: Problem reporting website: opts must include a valid :workspace
[11/21/2018 11:55:38] [e(0)] core: /home/oytun/pentest/exploits/metasploit-framework/lib/msf/util/db_manager.rb:35:in `process_opts_workspace'
[11/21/2018 11:55:38] [e(0)] core: /home/oytun/pentest/exploits/metasploit-framework/lib/msf/core/db_manager/web.rb:191:in `block in report_web_site'
[11/21/2018 11:55:38] [e(0)] core: /var/lib/gems/2.5.0/gems/activerecord-4.2.10/lib/active_record/connection_adapters/abstract/connection_pool.rb:292:in `with_connection'
[11/21/2018 11:55:38] [e(0)] core: /home/oytun/pentest/exploits/metasploit-framework/lib/msf/core/db_manager/web.rb:190:in `report_web_site'
[11/21/2018 11:55:38] [e(0)] core: /home/oytun/pentest/exploits/metasploit-framework/lib/metasploit/framework/data_service/proxy/web_data_proxy.rb:5:in `block in report_web_site'
[11/21/2018 11:55:38] [e(0)] core: /home/oytun/pentest/exploits/metasploit-framework/lib/metasploit/framework/data_service/proxy/core.rb:166:in `data_service_operation'
[11/21/2018 11:55:38] [e(0)] core: /home/oytun/pentest/exploits/metasploit-framework/lib/metasploit/framework/data_service/proxy/web_data_proxy.rb:4:in `report_web_site'
[11/21/2018 11:55:38] [e(0)] core: /home/oytun/pentest/exploits/metasploit-framework/plugins/wmap.rb:1347:in `add_web_site'
[11/21/2018 11:55:38] [e(0)] core: /home/oytun/pentest/exploits/metasploit-framework/plugins/wmap.rb:132:in `cmd_wmap_sites'
[11/21/2018 11:55:38] [e(0)] core: /home/oytun/pentest/exploits/metasploit-framework/lib/rex/ui/text/dispatcher_shell.rb:502:in `run_command'
[11/21/2018 11:55:38] [e(0)] core: /home/oytun/pentest/exploits/metasploit-framework/lib/rex/ui/text/dispatcher_shell.rb:453:in `block in run_single'
[11/21/2018 11:55:38] [e(0)] core: /home/oytun/pentest/exploits/metasploit-framework/lib/rex/ui/text/dispatcher_shell.rb:447:in `each'
[11/21/2018 11:55:38] [e(0)] core: /home/oytun/pentest/exploits/metasploit-framework/lib/rex/ui/text/dispatcher_shell.rb:447:in `run_single'
[11/21/2018 11:55:38] [e(0)] core: /home/oytun/pentest/exploits/metasploit-framework/lib/rex/ui/text/shell.rb:151:in `run'
[11/21/2018 11:55:38] [e(0)] core: /home/oytun/pentest/exploits/metasploit-framework/lib/metasploit/framework/command/console.rb:48:in `start'
[11/21/2018 11:55:38] [e(0)] core: /home/oytun/pentest/exploits/metasploit-framework/lib/metasploit/framework/command/base.rb:82:in `start'
[11/21/2018 11:55:38] [e(0)] core: /home/oytun/pentest/exploits/metasploit-framework/msfconsole:49:in `<main>'
[11/21/2018 11:55:42] [e(0)] core: Problem reporting website: opts must include a valid :workspace
[11/21/2018 11:55:42] [e(0)] core: /home/oytun/pentest/exploits/metasploit-framework/lib/msf/util/db_manager.rb:35:in `process_opts_workspace'
[11/21/2018 11:55:42] [e(0)] core: /home/oytun/pentest/exploits/metasploit-framework/lib/msf/core/db_manager/web.rb:191:in `block in report_web_site'
[11/21/2018 11:55:42] [e(0)] core: /var/lib/gems/2.5.0/gems/activerecord-4.2.10/lib/active_record/connection_adapters/abstract/connection_pool.rb:292:in `with_connection'
[11/21/2018 11:55:42] [e(0)] core: /home/oytun/pentest/exploits/metasploit-framework/lib/msf/core/db_manager/web.rb:190:in `report_web_site'
[11/21/2018 11:55:42] [e(0)] core: /home/oytun/pentest/exploits/metasploit-framework/lib/metasploit/framework/data_service/proxy/web_data_proxy.rb:5:in `block in report_web_site'
[11/21/2018 11:55:42] [e(0)] core: /home/oytun/pentest/exploits/metasploit-framework/lib/metasploit/framework/data_service/proxy/core.rb:166:in `data_service_operation'
[11/21/2018 11:55:42] [e(0)] core: /home/oytun/pentest/exploits/metasploit-framework/lib/metasploit/framework/data_service/proxy/web_data_proxy.rb:4:in `report_web_site'
[11/21/2018 11:55:42] [e(0)] core: /home/oytun/pentest/exploits/metasploit-framework/plugins/wmap.rb:1347:in `add_web_site'
[11/21/2018 11:55:42] [e(0)] core: /home/oytun/pentest/exploits/metasploit-framework/plugins/wmap.rb:132:in `cmd_wmap_sites'
[11/21/2018 11:55:42] [e(0)] core: /home/oytun/pentest/exploits/metasploit-framework/lib/rex/ui/text/dispatcher_shell.rb:502:in `run_command'
[11/21/2018 11:55:42] [e(0)] core: /home/oytun/pentest/exploits/metasploit-framework/lib/rex/ui/text/dispatcher_shell.rb:453:in `block in run_single'
[11/21/2018 11:55:42] [e(0)] core: /home/oytun/pentest/exploits/metasploit-framework/lib/rex/ui/text/dispatcher_shell.rb:447:in `each'
[11/21/2018 11:55:42] [e(0)] core: /home/oytun/pentest/exploits/metasploit-framework/lib/rex/ui/text/dispatcher_shell.rb:447:in `run_single'
[11/21/2018 11:55:42] [e(0)] core: /home/oytun/pentest/exploits/metasploit-framework/lib/rex/ui/text/shell.rb:151:in `run'
[11/21/2018 11:55:42] [e(0)] core: /home/oytun/pentest/exploits/metasploit-framework/lib/metasploit/framework/command/console.rb:48:in `start'
[11/21/2018 11:55:42] [e(0)] core: /home/oytun/pentest/exploits/metasploit-framework/lib/metasploit/framework/command/base.rb:82:in `start'
[11/21/2018 11:55:42] [e(0)] core: /home/oytun/pentest/exploits/metasploit-framework/msfconsole:49:in `<main>'
[11/21/2018 11:55:44] [e(0)] core: Problem reporting website: opts must include a valid :workspace
[11/21/2018 11:55:44] [e(0)] core: /home/oytun/pentest/exploits/metasploit-framework/lib/msf/util/db_manager.rb:35:in `process_opts_workspace'
[11/21/2018 11:55:44] [e(0)] core: /home/oytun/pentest/exploits/metasploit-framework/lib/msf/core/db_manager/web.rb:191:in `block in report_web_site'
[11/21/2018 11:55:44] [e(0)] core: /var/lib/gems/2.5.0/gems/activerecord-4.2.10/lib/active_record/connection_adapters/abstract/connection_pool.rb:292:in `with_connection'
[11/21/2018 11:55:44] [e(0)] core: /home/oytun/pentest/exploits/metasploit-framework/lib/msf/core/db_manager/web.rb:190:in `report_web_site'
[11/21/2018 11:55:44] [e(0)] core: /home/oytun/pentest/exploits/metasploit-framework/lib/metasploit/framework/data_service/proxy/web_data_proxy.rb:5:in `block in report_web_site'
[11/21/2018 11:55:44] [e(0)] core: /home/oytun/pentest/exploits/metasploit-framework/lib/metasploit/framework/data_service/proxy/core.rb:166:in `data_service_operation'
[11/21/2018 11:55:44] [e(0)] core: /home/oytun/pentest/exploits/metasploit-framework/lib/metasploit/framework/data_service/proxy/web_data_proxy.rb:4:in `report_web_site'
[11/21/2018 11:55:44] [e(0)] core: /home/oytun/pentest/exploits/metasploit-framework/plugins/wmap.rb:1347:in `add_web_site'
[11/21/2018 11:55:44] [e(0)] core: /home/oytun/pentest/exploits/metasploit-framework/plugins/wmap.rb:132:in `cmd_wmap_sites'
[11/21/2018 11:55:44] [e(0)] core: /home/oytun/pentest/exploits/metasploit-framework/lib/rex/ui/text/dispatcher_shell.rb:502:in `run_command'
[11/21/2018 11:55:44] [e(0)] core: /home/oytun/pentest/exploits/metasploit-framework/lib/rex/ui/text/dispatcher_shell.rb:453:in `block in run_single'
[11/21/2018 11:55:44] [e(0)] core: /home/oytun/pentest/exploits/metasploit-framework/lib/rex/ui/text/dispatcher_shell.rb:447:in `each'
[11/21/2018 11:55:44] [e(0)] core: /home/oytun/pentest/exploits/metasploit-framework/lib/rex/ui/text/dispatcher_shell.rb:447:in `run_single'
[11/21/2018 11:55:44] [e(0)] core: /home/oytun/pentest/exploits/metasploit-framework/lib/rex/ui/text/shell.rb:151:in `run'
[11/21/2018 11:55:44] [e(0)] core: /home/oytun/pentest/exploits/metasploit-framework/lib/metasploit/framework/command/console.rb:48:in `start'
[11/21/2018 11:55:44] [e(0)] core: /home/oytun/pentest/exploits/metasploit-framework/lib/metasploit/framework/command/base.rb:82:in `start'
[11/21/2018 11:55:44] [e(0)] core: /home/oytun/pentest/exploits/metasploit-framework/msfconsole:49:in `<main>'

System stuff

Metasploit version

Framework Version: 5.0.0-dev-7084538b8c

I installed Metasploit with:

OS

Ubuntu 18.10 Server Edition
ruby 2.5.1p57 (2018-03-29 revision 63029) [x86_64-linux-gnu]

@threedr3am
Copy link

My mac os 10.13.6 have this problem too.

exenin pushed a commit to exenin/metasploit-framework that referenced this issue Nov 30, 2018
@exenin
Copy link

exenin commented Nov 30, 2018

had the same issue - the fix is to pass the workspace to the report_website method #11043

@bcoles
Copy link
Contributor

bcoles commented Jan 20, 2019

Closed #10999 via #11284

@bcoles bcoles closed this as completed Jan 20, 2019
@bcoles bcoles added the plugin label Feb 24, 2019
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Projects
None yet
Development

No branches or pull requests

4 participants