View Issue Details
|ID||Project||Category||View Status||Date Submitted||Last Update|
|0006403||Kali Linux||[All Projects] Kali Package Bug||public||2020-05-21 09:33||2021-01-20 21:14|
|Target Version||Fixed in Version|
|Summary||0006403: Meterpreter session is closing exactly after 30 Seconds.|
While exploiting using PHP, my sessions are expiring exactly after 30 seconds.
I'm using php payload to exploit command injection vulnerability.
I even made changes in php.ini to make the session go longer than 30 seconds by changing max_execution_time but still it doesn't work.
I'm getting this error "Meterpreter session is not valid and will be closed."
Please help me resolve this issue.
Kali Linux: 5.6.0-kali1-amd64 (last updated on 2020-05-12)
Victim Machine: owaspbwa 2.6.32-25-generic-pae
Virtulization Product: VMWare Workstation 15
msf5 exploit(multi/handler) > run
 Started reverse TCP handler on 192.168.X.A:4444
 Sending stage (38288 bytes) to 192.168.X.V
[*] Meterpreter session 1 opened (192.168.X.A:4444 -> 192.168.X.V:45365) at 2020-05-21 00:39:01 -0400
[-] Meterpreter session 1 is not valid and will be closed
[*] 192.168.X.V - Meterpreter session 1 closed.
|Additional Information||I have been trying to find the solution for this since last 3 days. Please help me resolve this on priority.|
||You've already opened a ticket here https://github.com/rapid7/metasploit-framework/issues/13495.|
||Yes I know but I haven't got the resolution for my issue... not here and certainly not there... If you know then please help me resolve this.|
||It should be quite obvious that the Kali team can't give support for Metasploit so i wouldn't expect a solution here.|
|2020-05-21 09:33||DrSpy||New Issue|
|2020-05-22 10:45||usama||Note Added: 0012818|
|2020-05-22 11:56||DrSpy||Note Added: 0012819|
|2020-12-01 10:48||g0tmi1k||Priority||high => normal|
|2020-12-01 10:50||g0tmi1k||Severity||major => minor|
|2021-01-20 21:14||kali-bugreport||Note Added: 0014126|