Metasploit mailing list archives
msfweb error - Rev. 6352
From: mubix at room362.com (Rob Fuller)
Date: Wed, 18 Mar 2009 09:10:14 -0400
I'll be the first to say I don't know much about Ruby, but do you have 'gems' installed? On Wed, Mar 18, 2009 at 7:29 AM, Florian Roth <Neo.X at web.de> wrote:
Using "msfweb" Rev. 6352 on Ubuntu Linux I get the following error. Has anybody a fix or is this a problem on my system? ---------------------------------------------------- svn checkout http://metasploit.com/svn/framework3/trunk/ metasploit ... Checked out revision 6352. root at bt:/pentest/exploits# cd metasploit/ root at bt:/pentest/exploits/metasploit# ./msfweb [*] Starting msfweb v3.3-dev on http://127.0.0.1:55555/ => Booting WEBrick... [*] WEBrick directory traversal patch loaded /usr/lib/ruby/1.8/rubygems/custom_require.rb:27:in `gem_original_require': no such file to load -- metasm/exe_format/shellcode (MissingSourceFile) from /usr/lib/ruby/1.8/rubygems/custom_require.rb:27:in `require' from /pentest/exploits/metasploit/data/msfweb/vendor/rails/activesupport/lib/acti ve_support/dependencies.rb:510:in `require' from /pentest/exploits/metasploit/data/msfweb/vendor/rails/activesupport/lib/acti ve_support/dependencies.rb:355:in `new_constants_in' from /pentest/exploits/metasploit/data/msfweb/vendor/rails/activesupport/lib/acti ve_support/dependencies.rb:510:in `require' from ./lib/metasm/metasm.rb:52:in `const_missing' from ./lib/metasm/metasm.rb:52:in `each' from ./lib/metasm/metasm.rb:52:in `const_missing' from ./lib/msf/core/payload.rb:515:in `build' from ./lib/msf/core/payload.rb:535:in `internal_generate' from ./lib/msf/core/payload/single.rb:39:in `generate' from ./lib/msf/core/payload/linux.rb:60:in `generate' from ./lib/msf/core/payload.rb:160:in `size' from ./lib/msf/core/payload_set.rb:101:in `recalculate' from ./lib/msf/core/payload_set.rb:86:in `each_pair' from ./lib/msf/core/payload_set.rb:86:in `recalculate' from ./lib/msf/core/module_manager.rb:884:in `load_modules' from ./lib/msf/core/module_manager.rb:883:in `each_key' from ./lib/msf/core/module_manager.rb:883:in `load_modules' from ./lib/msf/core/module_manager.rb:634:in `add_module_path' from ./lib/msf/base/simple/framework.rb:107:in `simplify' from ./lib/msf/base/simple/framework.rb:70:in `create' from /pentest/exploits/metasploit/data/msfweb/config/../../../lib/msf/ui/web/driv er.rb:52:in `initialize' from /pentest/exploits/metasploit/data/msfweb/config/environment.rb:52:in `new' from /pentest/exploits/metasploit/data/msfweb/config/environment.rb:52 from /usr/lib/ruby/1.8/rubygems/custom_require.rb:27:in `gem_original_require' from /usr/lib/ruby/1.8/rubygems/custom_require.rb:27:in `require' from /pentest/exploits/metasploit/data/msfweb/vendor/rails/activesupport/lib/acti ve_support/dependencies.rb:510:in `require' from /pentest/exploits/metasploit/data/msfweb/vendor/rails/activesupport/lib/acti ve_support/dependencies.rb:355:in `new_constants_in' from /pentest/exploits/metasploit/data/msfweb/vendor/rails/activesupport/lib/acti ve_support/dependencies.rb:510:in `require' from /pentest/exploits/metasploit/data/msfweb/vendor/rails/railties/lib/commands/ servers/webrick.rb:59 from /usr/lib/ruby/1.8/rubygems/custom_require.rb:27:in `gem_original_require' from /usr/lib/ruby/1.8/rubygems/custom_require.rb:27:in `require' from /pentest/exploits/metasploit/data/msfweb/vendor/rails/activesupport/lib/acti ve_support/dependencies.rb:510:in `require' from /pentest/exploits/metasploit/data/msfweb/vendor/rails/activesupport/lib/acti ve_support/dependencies.rb:355:in `new_constants_in' from /pentest/exploits/metasploit/data/msfweb/vendor/rails/activesupport/lib/acti ve_support/dependencies.rb:510:in `require' from /pentest/exploits/metasploit/data/msfweb/vendor/rails/railties/lib/commands/ server.rb:39 from /usr/lib/ruby/1.8/rubygems/custom_require.rb:27:in `gem_original_require' from /usr/lib/ruby/1.8/rubygems/custom_require.rb:27:in `require' from ./script/server:3 from ./msfweb:85:in `load' from ./msfweb:85 root at bt:/pentest/exploits/metasploit# __________ Information from ESET NOD32 Antivirus, version of virus signature database 3944 (20090317) __________ The message was checked by ESET NOD32 Antivirus. http://www.eset.com _______________________________________________ http://spool.metasploit.com/mailman/listinfo/framework
-------------- next part -------------- An HTML attachment was scrubbed... URL: <http://mail.metasploit.com/pipermail/framework/attachments/20090318/aa843570/attachment.htm>
Current thread:
- msfweb error - Rev. 6352 Florian Roth (Mar 18)
- <Possible follow-ups>
- msfweb error - Rev. 6352 Rob Fuller (Mar 18)
- msfweb error - Rev. 6352 Danilo Nascimento (Mar 18)
- msfweb error - Rev. 6352 Florian Roth (Mar 18)