Metasploit-framework: Meterpreter "Error running command shell: ArgumentError wrong number of arguments (given 6, expected 5)"

Created on 27 Apr 2020  路  4Comments  路  Source: rapid7/metasploit-framework

env

target : Local win8.1 64bit No AV
local: linux mint Metasploit

operating

msf5 > use exploit/multi/handler 
msf5 exploit(multi/handler) > set payload windows/x64/meterpreter/reverse_http
msf5 exploit(multi/handler) > set lhost 192.168.159.229
msf5 exploit(multi/handler) > set lport 8080
msf5 exploit(multi/handler) > set set EnableStageEncoding true
msf5 exploit(multi/handler) > set EnableStageEncoding true
msf5 exploit(multi/handler) > set stageencoder x64/xor
msf5 exploit(multi/handler) > exploit
meterpreter > shell 
[-] Failed to spawn shell with thread impersonation. Retrying without it.
[-] Error running command shell: ArgumentError wrong number of arguments (given 6, expected 5)

version

msf5 exploit(multi/handler) > version 
Framework: 5.0.87-dev-
Console  : 5.0.87-dev-

msfconsole error log

[04/27/2020 20:12:38] [i(0)] core: Default data service found. Attempting to connect...
[04/27/2020 20:12:38] [e(0)] core: No database definition for environment production
[04/27/2020 20:12:40] [e(0)] core: Dependency for windows/x64/encrypted_shell_reverse_tcp is not supported
[04/27/2020 20:12:40] [e(0)] core: Dependency for windows/encrypted_shell_reverse_tcp is not supported
[04/27/2020 20:12:40] [e(0)] core: Dependency for windows/encrypted_reverse_tcp is not supported
[04/27/2020 20:12:40] [e(0)] core: Dependency for windows/x64/encrypted_reverse_tcp is not supported
[04/27/2020 20:13:35] [i(0)] core: windows/x64/meterpreter/reverse_http: iteration 1: Successfully encoded with encoder x64/xor (size is 207495)
[04/27/2020 20:15:55] [e(0)] meterpreter: Error running command shell: ArgumentError wrong number of arguments (given 6, expected 5)
[04/27/2020 20:15:55] [d(0)] meterpreter: Call stack:
/opt/metasploit-framework/embedded/framework/lib/rex/post/meterpreter/channels/pools/stream_pool.rb:36:in `initialize'
/opt/metasploit-framework/embedded/framework/lib/rex/post/meterpreter/extensions/stdapi/sys/process.rb:183:in `new'
/opt/metasploit-framework/embedded/framework/lib/rex/post/meterpreter/extensions/stdapi/sys/process.rb:183:in `execute'
/opt/metasploit-framework/embedded/framework/lib/rex/post/meterpreter/ui/console/command_dispatcher/stdapi/sys.rb:233:in `cmd_execute'
/opt/metasploit-framework/embedded/framework/lib/rex/post/meterpreter/ui/console/command_dispatcher/stdapi/sys.rb:315:in `rescue in cmd_shell'
/opt/metasploit-framework/embedded/framework/lib/rex/post/meterpreter/ui/console/command_dispatcher/stdapi/sys.rb:310:in `cmd_shell'
/opt/metasploit-framework/embedded/framework/lib/rex/ui/text/dispatcher_shell.rb:523:in `run_command'
/opt/metasploit-framework/embedded/framework/lib/rex/post/meterpreter/ui/console.rb:105:in `run_command'
/opt/metasploit-framework/embedded/framework/lib/rex/ui/text/dispatcher_shell.rb:474:in `block in run_single'
/opt/metasploit-framework/embedded/framework/lib/rex/ui/text/dispatcher_shell.rb:468:in `each'
/opt/metasploit-framework/embedded/framework/lib/rex/ui/text/dispatcher_shell.rb:468:in `run_single'
/opt/metasploit-framework/embedded/framework/lib/rex/post/meterpreter/ui/console.rb:68:in `block in interact'
/opt/metasploit-framework/embedded/framework/lib/rex/ui/text/shell.rb:153:in `run'
/opt/metasploit-framework/embedded/framework/lib/rex/post/meterpreter/ui/console.rb:66:in `interact'
/opt/metasploit-framework/embedded/framework/lib/msf/base/sessions/meterpreter.rb:583:in `_interact'
/opt/metasploit-framework/embedded/framework/lib/rex/ui/interactive.rb:51:in `interact'
/opt/metasploit-framework/embedded/framework/lib/msf/ui/console/command_dispatcher/core.rb:1389:in `cmd_sessions'
/opt/metasploit-framework/embedded/framework/lib/rex/ui/text/dispatcher_shell.rb:523:in `run_command'
/opt/metasploit-framework/embedded/framework/lib/rex/ui/text/dispatcher_shell.rb:474:in `block in run_single'
/opt/metasploit-framework/embedded/framework/lib/rex/ui/text/dispatcher_shell.rb:468:in `each'
/opt/metasploit-framework/embedded/framework/lib/rex/ui/text/dispatcher_shell.rb:468:in `run_single'
/opt/metasploit-framework/embedded/framework/lib/msf/ui/console/command_dispatcher/exploit.rb:215:in `cmd_exploit'
/opt/metasploit-framework/embedded/framework/lib/rex/ui/text/dispatcher_shell.rb:523:in `run_command'
/opt/metasploit-framework/embedded/framework/lib/rex/ui/text/dispatcher_shell.rb:474:in `block in run_single'
/opt/metasploit-framework/embedded/framework/lib/rex/ui/text/dispatcher_shell.rb:468:in `each'
/opt/metasploit-framework/embedded/framework/lib/rex/ui/text/dispatcher_shell.rb:468:in `run_single'
/opt/metasploit-framework/embedded/framework/lib/rex/ui/text/shell.rb:158:in `run'
/opt/metasploit-framework/embedded/framework/lib/metasploit/framework/command/console.rb:48:in `start'
/opt/metasploit-framework/embedded/framework/lib/metasploit/framework/command/base.rb:82:in `start'
/opt/metasploit-framework/bin/../embedded/framework/msfconsole:17:in `<main>'
[04/27/2020 20:19:38] [e(0)] core: Dependency for windows/x64/encrypted_shell_reverse_tcp is not supported
[04/27/2020 20:19:38] [e(0)] core: Dependency for windows/encrypted_shell_reverse_tcp is not supported
[04/27/2020 20:19:38] [e(0)] core: Dependency for windows/encrypted_reverse_tcp is not supported
[04/27/2020 20:19:38] [e(0)] core: Dependency for windows/x64/encrypted_reverse_tcp is not supported
[04/27/2020 20:19:39] [e(0)] core: Dependency for windows/x64/encrypted_shell_reverse_tcp is not supported
[04/27/2020 20:19:39] [e(0)] core: Dependency for windows/encrypted_shell_reverse_tcp is not supported
[04/27/2020 20:19:39] [e(0)] core: Dependency for windows/encrypted_reverse_tcp is not supported
[04/27/2020 20:19:39] [e(0)] core: Dependency for windows/x64/encrypted_reverse_tcp is not supported
Stale bug payload

All 4 comments

Edited to update formatting to make this easier to read.

env

target : Local win8.1 64bit No AV
local: linux mint Metasploit

operating

msf5 > use exploit/multi/handler 
msf5 exploit(multi/handler) > set payload windows/x64/meterpreter/reverse_http
msf5 exploit(multi/handler) > set lhost 192.168.159.229
msf5 exploit(multi/handler) > set lport 8080
msf5 exploit(multi/handler) > set set EnableStageEncoding true
msf5 exploit(multi/handler) > set EnableStageEncoding true
msf5 exploit(multi/handler) > set stageencoder x64/xor
msf5 exploit(multi/handler) > exploit
meterpreter > shell 
[-] Failed to spawn shell with thread impersonation. Retrying without it.
[-] Error running command shell: ArgumentError wrong number of arguments (given 6, expected 5)

version

msf5 exploit(multi/handler) > version 
Framework: 5.0.87-dev-
Console  : 5.0.87-dev-

msfconsole error log

[04/27/2020 20:12:38] [i(0)] core: Default data service found. Attempting to connect...
[04/27/2020 20:12:38] [e(0)] core: No database definition for environment production
[04/27/2020 20:12:40] [e(0)] core: Dependency for windows/x64/encrypted_shell_reverse_tcp is not supported
[04/27/2020 20:12:40] [e(0)] core: Dependency for windows/encrypted_shell_reverse_tcp is not supported
[04/27/2020 20:12:40] [e(0)] core: Dependency for windows/encrypted_reverse_tcp is not supported
[04/27/2020 20:12:40] [e(0)] core: Dependency for windows/x64/encrypted_reverse_tcp is not supported
[04/27/2020 20:13:35] [i(0)] core: windows/x64/meterpreter/reverse_http: iteration 1: Successfully encoded with encoder x64/xor (size is 207495)
[04/27/2020 20:15:55] [e(0)] meterpreter: Error running command shell: ArgumentError wrong number of arguments (given 6, expected 5)
[04/27/2020 20:15:55] [d(0)] meterpreter: Call stack:
/opt/metasploit-framework/embedded/framework/lib/rex/post/meterpreter/channels/pools/stream_pool.rb:36:in `initialize'
/opt/metasploit-framework/embedded/framework/lib/rex/post/meterpreter/extensions/stdapi/sys/process.rb:183:in `new'
/opt/metasploit-framework/embedded/framework/lib/rex/post/meterpreter/extensions/stdapi/sys/process.rb:183:in `execute'
/opt/metasploit-framework/embedded/framework/lib/rex/post/meterpreter/ui/console/command_dispatcher/stdapi/sys.rb:233:in `cmd_execute'
/opt/metasploit-framework/embedded/framework/lib/rex/post/meterpreter/ui/console/command_dispatcher/stdapi/sys.rb:315:in `rescue in cmd_shell'
/opt/metasploit-framework/embedded/framework/lib/rex/post/meterpreter/ui/console/command_dispatcher/stdapi/sys.rb:310:in `cmd_shell'
/opt/metasploit-framework/embedded/framework/lib/rex/ui/text/dispatcher_shell.rb:523:in `run_command'
/opt/metasploit-framework/embedded/framework/lib/rex/post/meterpreter/ui/console.rb:105:in `run_command'
/opt/metasploit-framework/embedded/framework/lib/rex/ui/text/dispatcher_shell.rb:474:in `block in run_single'
/opt/metasploit-framework/embedded/framework/lib/rex/ui/text/dispatcher_shell.rb:468:in `each'
/opt/metasploit-framework/embedded/framework/lib/rex/ui/text/dispatcher_shell.rb:468:in `run_single'
/opt/metasploit-framework/embedded/framework/lib/rex/post/meterpreter/ui/console.rb:68:in `block in interact'
/opt/metasploit-framework/embedded/framework/lib/rex/ui/text/shell.rb:153:in `run'
/opt/metasploit-framework/embedded/framework/lib/rex/post/meterpreter/ui/console.rb:66:in `interact'
/opt/metasploit-framework/embedded/framework/lib/msf/base/sessions/meterpreter.rb:583:in `_interact'
/opt/metasploit-framework/embedded/framework/lib/rex/ui/interactive.rb:51:in `interact'
/opt/metasploit-framework/embedded/framework/lib/msf/ui/console/command_dispatcher/core.rb:1389:in `cmd_sessions'
/opt/metasploit-framework/embedded/framework/lib/rex/ui/text/dispatcher_shell.rb:523:in `run_command'
/opt/metasploit-framework/embedded/framework/lib/rex/ui/text/dispatcher_shell.rb:474:in `block in run_single'
/opt/metasploit-framework/embedded/framework/lib/rex/ui/text/dispatcher_shell.rb:468:in `each'
/opt/metasploit-framework/embedded/framework/lib/rex/ui/text/dispatcher_shell.rb:468:in `run_single'
/opt/metasploit-framework/embedded/framework/lib/msf/ui/console/command_dispatcher/exploit.rb:215:in `cmd_exploit'
/opt/metasploit-framework/embedded/framework/lib/rex/ui/text/dispatcher_shell.rb:523:in `run_command'
/opt/metasploit-framework/embedded/framework/lib/rex/ui/text/dispatcher_shell.rb:474:in `block in run_single'
/opt/metasploit-framework/embedded/framework/lib/rex/ui/text/dispatcher_shell.rb:468:in `each'
/opt/metasploit-framework/embedded/framework/lib/rex/ui/text/dispatcher_shell.rb:468:in `run_single'
/opt/metasploit-framework/embedded/framework/lib/rex/ui/text/shell.rb:158:in `run'
/opt/metasploit-framework/embedded/framework/lib/metasploit/framework/command/console.rb:48:in `start'
/opt/metasploit-framework/embedded/framework/lib/metasploit/framework/command/base.rb:82:in `start'
/opt/metasploit-framework/bin/../embedded/framework/msfconsole:17:in `<main>'
[04/27/2020 20:19:38] [e(0)] core: Dependency for windows/x64/encrypted_shell_reverse_tcp is not supported
[04/27/2020 20:19:38] [e(0)] core: Dependency for windows/encrypted_shell_reverse_tcp is not supported
[04/27/2020 20:19:38] [e(0)] core: Dependency for windows/encrypted_reverse_tcp is not supported
[04/27/2020 20:19:38] [e(0)] core: Dependency for windows/x64/encrypted_reverse_tcp is not supported
[04/27/2020 20:19:39] [e(0)] core: Dependency for windows/x64/encrypted_shell_reverse_tcp is not supported
[04/27/2020 20:19:39] [e(0)] core: Dependency for windows/encrypted_shell_reverse_tcp is not supported
[04/27/2020 20:19:39] [e(0)] core: Dependency for windows/encrypted_reverse_tcp is not supported
[04/27/2020 20:19:39] [e(0)] core: Dependency for windows/x64/encrypted_reverse_tcp is not supported

https://github.com/rapid7/metasploit-framework/commit/078652749dabaf2ac599a749235ef56a9e7895b4 newest version has solve this

Hi!

This issue has been left open with no activity for a while now.

We get a lot of issues, so we currently close issues after 60 days of inactivity. It鈥檚 been at least 30 days since the last update here.
If we missed this issue or if you want to keep it open, please reply here. You can also add the label "not stale" to keep this issue open!

As a friendly reminder: the best way to see this issue, or any other, fixed is to open a Pull Request.

Closing this issue as @FunnyWolf mentioned that https://github.com/rapid7/metasploit-framework/commit/078652749dabaf2ac599a749235ef56a9e7895b4 solves this issue.

Was this page helpful?
0 / 5 - 0 ratings

Related issues

verapex picture verapex  路  3Comments

Funeoz picture Funeoz  路  3Comments

jecoliho picture jecoliho  路  3Comments

felipee07 picture felipee07  路  3Comments

Acidical picture Acidical  路  3Comments