By sending a specially crafted HTTP GET request to a listening Rapid7 Metasploit HTTP handler, an attacker can register an arbitrary regular expression. When evaluated, this malicious handler can either prevent new HTTP handler sessions from being established, or cause a resource exhaustion on the Metasploit server.
Metrics
Affected Vendors & Products
Advisories
No advisories yet.
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
| Link | Providers |
|---|---|
| https://github.com/rapid7/metasploit-framework/pull/12433 |
|
History
No history.
Status: PUBLISHED
Assigner: rapid7
Published:
Updated: 2024-09-17T03:29:11.352Z
Reserved: 2019-01-07T00:00:00
Link: CVE-2019-5645
No data.
Status : Modified
Published: 2020-09-01T15:15:11.983
Modified: 2024-11-21T04:45:17.867
Link: CVE-2019-5645
No data.
OpenCVE Enrichment
No data.