CVE-2019-5645
01.09.2020, 15:15
By sending a specially crafted HTTP GET request to a listening Rapid7 Metasploit HTTP handler, an attacker can register an arbitrary regular expression. When evaluated, this malicious handler can either prevent new HTTP handler sessions from being established, or cause a resource exhaustion on the Metasploit server.Enginsight
Vendor | Product | Version |
---|---|---|
rapid7 | metasploit | 𝑥 ≤ 5.0.27 |
𝑥
= Vulnerable software versions