i’am stuck here guys . i need help .
 Started reverse TCP handler on (my IP):4444
[!] This exploit may require manual cleanup of ‘image.php’ on the target
 Exploit completed, but no session was created.
#msf exploit(nibbleblog_file_upload) >
I’m stuck there. Any hint how you fix the problem?