Please note that I may have not written the parameters exactly, (I think RHOSTS has the S at the end bu LHOST does not). If the exploit is not working, make sure to double check the spelling of the parameters with what is typed in the walk-through f…
Have you tried running the module itself after setting the parameters? (RHOST, USERNAME, PASSWORD, TARGETURI, LHOST?)
The "No payload configured, defaulting to php/meterpreter/reverse_tcp" occurs because you have the option to use your ow…