Metasploit mailing list archives

Error connecting to Nexpose


From: 顺达张 <zhangshunda () gmail com>
Date: Wed, 17 Mar 2010 09:37:33 +0800

Hi all,

After installing Nexpose (download from Metasploit web site), I tried to
connect (using nexpose_connect) to it, but always fail.
I installed Nexpose in windows2003 sp1, run metasploit in local or remote,
errer message was the same:
*Error while running command nexpose_connect: #<RuntimeError: Illegal
character '&' in raw string "*
More detail error messages are in the end of this mail.

Thanks,
Shunda

*The detail error log:*
                                  _       _
             _                   | |     (_)_
 ____   ____| |_  ____  ___ ____ | | ___  _| |_
|    \ / _  )  _)/ _  |/___)  _ \| |/ _ \| |  _)
| | | ( (/ /| |_( ( | |___ | | | | | |_| | | |__
|_|_|_|\____)\___)_||_(___/| ||_/|_|\___/|_|\___)
                           |_|


       =[ metasploit v3.3.4-dev [core:3.3 api:1.0]
+ -- --=[ 539 exploits - 287 auxiliary
+ -- --=[ 198 payloads - 23 encoders - 8 nops
       =[ svn r8821 updated yesterday (2010.03.15)

msf > db_create
[*] The specified database already exists, connecting
[*] Successfully connected to the database
[*] File: /home/Administrator/.msf3/sqlite3.db
msf > load nexpose

 ____             _     _ _____   _   _     __  __
|  _ \ __ _ _ __ (_) __| |___  | | \ | | ___\ \/ /_ __   ___  ___  ___
| |_) / _` | '_ \| |/ _` |  / /  |  \| |/ _ \\  /| '_ \ / _ \/ __|/ _ \
|  _ < (_| | |_) | | (_| | / /   | |\  |  __//  \| |_) | (_) \__ \  __/
|_| \_\__,_| .__/|_|\__,_|/_/    |_| \_|\___/_/\_\ .__/ \___/|___/\___|
           |_|                                   |_|


[*] NeXpose integration has been activated
[*] Successfully loaded plugin: nexpose
msf > nexpose_connect nxadmin:123456@127.0.0.1:3780
[*] Connecting to NeXpose instance at 127.0.0.1:3780 with username
nxadmin...
[-] Error while running command nexpose_connect: #<RuntimeError: Illegal
character '&' in raw string "
         document.write('\u003ca href="');
         document.write(document.nxp.skin.getVendorSite());
         document.write('"\u003e');
         document.write(document.nxp.skin.getVendorName());
         document.write('\u003c/a\u003e, ');
         document.write(document.nxp.skin.getVendorAddress());
         var supportHelpURL = document.nxp.skin.getSupportHelpURL();
         if (supportHelpURL == null || supportHelpURL == '')
         {
            document.write(' | ');
            var sw = document.nxp.skin.getSupportWebsite();
            if ((sw != null) && (sw != ""))
            {
               document.write('\u003ca href="');
               document.write(htmlEscape(sw));
               document.write('"
target="_blank"\u003eSupport\u003c/a\u003e');
            }
            else
            {
               document.write('\u003ca href="mailto:&apos; <'>);
               document.write(document.nxp.skin.getSupportEmail());
               document.write('"\u003eSupport\u003c/a\u003e');
            }
         }
         document.write(' | ');
         document.write(document.nxp.skin.getVendorName());
         document.write(' ');
         document.write(document.nxp.skin.getVendorPhoneNum());
         ">
/usr/lib/ruby/1.9.1/rexml/text.rb:155:in `block in check'
/usr/lib/ruby/1.9.1/rexml/text.rb:153:in `scan'
/usr/lib/ruby/1.9.1/rexml/text.rb:153:in `check'
/usr/lib/ruby/1.9.1/rexml/text.rb:125:in `parent='
/usr/lib/ruby/1.9.1/rexml/parent.rb:19:in `add'
/usr/lib/ruby/1.9.1/rexml/parsers/treeparser.rb:45:in `parse'
/usr/lib/ruby/1.9.1/rexml/document.rb:228:in `build'
/usr/lib/ruby/1.9.1/rexml/document.rb:43:in `initialize'
/msf3/lib/rapid7/nexpose.rb:40:in `new'
/msf3/lib/rapid7/nexpose.rb:40:in `parse_xml'
/msf3/lib/rapid7/nexpose.rb:79:in `execute'
/msf3/lib/rapid7/nexpose.rb:123:in `execute'
/msf3/lib/rapid7/nexpose.rb:344:in `execute'
/msf3/lib/rapid7/nexpose.rb:325:in `login'
/msf3/plugins/nexpose.rb:106:in `cmd_nexpose_connect'
/msf3/lib/rex/ui/text/dispatcher_shell.rb:239:in `run_command'
/msf3/lib/rex/ui/text/dispatcher_shell.rb:201:in `block in run_single'
/msf3/lib/rex/ui/text/dispatcher_shell.rb:195:in `each'
/msf3/lib/rex/ui/text/dispatcher_shell.rb:195:in `run_single'
/msf3/lib/rex/ui/text/shell.rb:144:in `run'
msfconsole:93:in `<main>'
...
Illegal character '&' in raw string "
         document.write('\u003ca href="');
         document.write(document.nxp.skin.getVendorSite());
         document.write('"\u003e');
         document.write(document.nxp.skin.getVendorName());
         document.write('\u003c/a\u003e, ');
         document.write(document.nxp.skin.getVendorAddress());
         var supportHelpURL = document.nxp.skin.getSupportHelpURL();
         if (supportHelpURL == null || supportHelpURL == '')
         {
            document.write(' | ');
            var sw = document.nxp.skin.getSupportWebsite();
            if ((sw != null) && (sw != ""))
            {
               document.write('\u003ca href="');
               document.write(htmlEscape(sw));
               document.write('"
target="_blank"\u003eSupport\u003c/a\u003e');
            }
            else
            {
               document.write('\u003ca href="mailto:&apos; <'>);
               document.write(document.nxp.skin.getSupportEmail());
               document.write('"\u003eSupport\u003c/a\u003e');
            }
         }
         document.write(' | ');
         document.write(document.nxp.skin.getVendorName());
         document.write(' ');
         document.write(document.nxp.skin.getVendorPhoneNum());
         "
Line: 136
Position: 5469
Last 80 unconsumed characters:
</script>

Call stack:
/usr/lib/ruby/1.9.1/rexml/parsers/treeparser.rb:95:in `rescue in parse'
/usr/lib/ruby/1.9.1/rexml/parsers/treeparser.rb:20:in `parse'
/usr/lib/ruby/1.9.1/rexml/document.rb:228:in `build'
/usr/lib/ruby/1.9.1/rexml/document.rb:43:in `initialize'
/msf3/lib/rapid7/nexpose.rb:40:in `new'
/msf3/lib/rapid7/nexpose.rb:40:in `parse_xml'
/msf3/lib/rapid7/nexpose.rb:79:in `execute'
/msf3/lib/rapid7/nexpose.rb:123:in `execute'
/msf3/lib/rapid7/nexpose.rb:344:in `execute'
/msf3/lib/rapid7/nexpose.rb:325:in `login'
/msf3/plugins/nexpose.rb:106:in `cmd_nexpose_connect'
/msf3/lib/rex/ui/text/dispatcher_shell.rb:239:in `run_command'
/msf3/lib/rex/ui/text/dispatcher_shell.rb:201:in `block in run_single'
/msf3/lib/rex/ui/text/dispatcher_shell.rb:195:in `each'
/msf3/lib/rex/ui/text/dispatcher_shell.rb:195:in `run_single'
/msf3/lib/rex/ui/text/shell.rb:144:in `run'
msfconsole:93:in `<main>'
msf >
_______________________________________________
https://mail.metasploit.com/mailman/listinfo/framework

Current thread: