Abacus-Group-RTO / legion

Legion is an open source, easy-to-use, super-extensible and semi-automated network penetration testing tool that aids in discovery, reconnaissance and exploitation of information systems.

Repository from Github https://github.comAbacus-Group-RTO/legionRepository from Github https://github.comAbacus-Group-RTO/legion

list index out of range

feint9 opened this issue · comments

Hi,

Linux k21 5.15.0-kali2-amd64 #1 SMP Debian 5.15.5-2kali2 (2021-12-22) x86_64 GNU/Linux

Legion last version from git 11/02/2022 ver 0.3.8-1622657874

-oA ./tmp/legion-nato5awb-running/nmap/20220211100031722541-nmapstage3
{"time": "2022-02-11 10:01:19,620", "name": "Process 76 is done!", "level": "INFO", "data": {"logger_name": "legion"}, "context": {"module": "controller", "filename": "controller.py", "line": 839}}
Processing service result *********** name=domain prod=ISC BIND ver=9.11.4-P2 extra=RedHat Enterprise Linux 7 fing=
Did not find service *********** name=domain prod=ISC BIND ver=9.11.4-P2 extra=RedHat Enterprise Linux 7 fing=
Processing service result *********** name=ident prod= ver= extra= fing=
Did not find service *********** name=ident prod= ver= extra= fing=
Processing script obj <parsers.Script.Script object at 0x7fbd652b2a60>
-----------------------SCR: vulners
------------------------VULNERS
Loading database...
Traceback (most recent call last):
File "/root/tools/legion/app/importers/NmapImporter.py", line 283, in run
scrProcessorResults = scr.scriptSelector(db_host)
File "/root/tools/legion/parsers/Script.py", line 122, in scriptSelector
cveResults = self.getCves()
File "/root/tools/legion/parsers/Script.py", line 96, in getCves
cvesResults = self.processVulnersScriptOutput(cveOutput)
File "/root/tools/legion/parsers/Script.py", line 66, in processVulnersScriptOutput
resultCpeDetails['version'] = resultCpeData[4]
IndexError: list index out of range
./startLegion.sh: line 38: 2172947 Aborted /usr/bin/env python3 legion.py

Please just let me know if more info is needed.

thks!