I'm running metasploitable3 on virtualbox, kali-linux on vmware and the host os is windows 7.
Host System
OS: Windows 7
Packer Version: 0.12.3
Vagrant Version: 1.9.2
VirtualBox Version: 5.1.14
Although the "script_mvel_rce" module says "The target is vulnerable" after executing "check" command, it gave me "[*] Exploit completed, but no session was created." after executing "run" or "exploit".
msf exploit(script_mvel_rce) > check
[+]
172.28.128.3:9200 The target is vulnerable.
msf exploit(script_mvel_rce) > run
[*] Started bind handler
[*] Trying to execute arbitrary Java...
[*] Discovering remote OS...
[+] Remote OS is 'Windows Server 2008 R2'
[*] Discovering TEMP path
[+] TEMP path identified: 'C:\Windows\TEMP\'
[!] This exploit may require manual cleanup of 'C:\Windows\TEMP\Oef.jar' on the target
[*] Exploit completed, but no session was created.
the target machine runs "Elasticsearch REST API 1.1.1" on port 9200:
msf exploit(script_mvel_rce) > services
Services
========
host port proto name state info
---- ---- ----- ---- ----- ----
...
172.28.128.3 9200 tcp http open Elasticsearch REST API 1.1.1 name: Jessica Jones; Lucene 4.7
...
I tried to:
[1] reboot both kali & metasploitable3 machines
[2] switch the firewall off from both kali & metasploitable3
and yes I set the RHOST,RPORT,LHOST,LPORT and payload.
but the module still gives me the same result:
"[*] Exploit completed, but no session was created."
Also I saw this thread
https://groups.google.com/forum/#!topic/null-co-in/CbGrGG9wNNk and no solution was there.. so could anyone help me with that?