Noam Rathaus
Noam Rathaus
Its not specific to the exploit I mentioned, just there it is evident if you compare RPC results and msfconsole results - due to lack of the payload values not...
I am using `pymetasploit3` (just for context) and the `use` for ExploitModule class What it does, is call `module.info`, pulls all the `_info` information and places them in `dicts` It...
Proposed fix: https://github.com/rapid7/metasploit-framework/pull/19086 I used via pymetasploit3 code that `use` all available exploits to confirm this has no effect beyond exposing the information (i.e. no crash)
``` from pymetasploit3.msfrpc import MsfRpcClient client = MsfRpcClient( metasploit_msfrpcd_password, port=55544 ssl=True ) exploits = client.modules.search("type:exploit") for exploit in exploits: res = client.modules.use("exploit", exploit) ```