Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Fix for issue #14678 #14680

Merged
merged 1 commit into from
Jan 29, 2021
Merged

Fix for issue #14678 #14680

merged 1 commit into from
Jan 29, 2021

Conversation

digininja
Copy link
Contributor

@digininja digininja commented Jan 29, 2021

Stops the printing of a rogue nil when exploit completes.

Closes #14678

Tell us what this change does. If you're fixing a bug, please mention
the github issue number.

Please ensure you are submitting from a unique branch in your repository to master in Rapid7's.

Verification

List the steps needed to make sure this thing works

  • Start msfconsole
  • use exploit/windows/smb/ms08_067_netapi
  • ...
  • Verify the thing does what it should
  • Verify the thing does not do what it should not
  • Document the thing and how it works (Example)

If you are opening a PR for a new module that exploits a specific piece of hardware or requires a complex or hard-to-find testing environment, we recommend that you send us a demo of your module executing correctly. Seeing your module in action will help us review your PR faster!

Specific Hardware Examples:

  • Switches
  • Routers
  • IP Cameras
  • IoT devices

Complex Software Examples:

  • Expensive proprietary software
  • Software with an extensive installation process
  • Software that requires exploit testing across multiple significantly different versions
  • Software without an English language UI

We will also accept demonstrations of successful module execution even if your module doesn't meet the above conditions. It's not a necessity, but it may help us land your module faster!

Demonstration of successful module execution can take the form of a packet capture (pcap) or a screen recording. You can send pcaps and recordings to msfdev@metaspolit.com. Please include a CVE number in the subject header (if applicable), and a link to your PR in the email body.

Stops the printing of a rogue nil when exploit completes.

See rapid7#14678
@bcoles bcoles added the easy label Jan 29, 2021
@bcoles bcoles self-assigned this Jan 29, 2021
@bcoles bcoles merged commit 9beec65 into rapid7:master Jan 29, 2021
@bcoles
Copy link
Contributor

bcoles commented Jan 29, 2021

Does this warrant release notes ? rn-fix ?

@digininja digininja deleted the rogue_nil_fix branch January 29, 2021 11:52
@digininja
Copy link
Contributor Author

digininja commented Jan 29, 2021 via email

@bcoles
Copy link
Contributor

bcoles commented Jan 29, 2021

If that is aimed at me, no idea!

It wasn't - general question for whoever happens to be paying attention to notifications. Too slow. rn-fix it is.

@bcoles bcoles added the rn-fix release notes fix label Jan 29, 2021
@bcoles
Copy link
Contributor

bcoles commented Jan 29, 2021

Release Notes

Updated exploit/windows/winrm/winrm_script_exec to avoid printing nil when no command output is returned.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
easy rn-fix release notes fix
Projects
None yet
Development

Successfully merging this pull request may close these issues.

Rogue nil before meterpreter shell starts
2 participants