CVE-2019-5645
HIGHRapid7 Metasploit < 5.0.27 - Denial of Service
Title source: ruleDescription
By sending a specially crafted HTTP GET request to a listening Rapid7 Metasploit HTTP handler, an attacker can register an arbitrary regular expression. When evaluated, this malicious handler can either prevent new HTTP handler sessions from being established, or cause a resource exhaustion on the Metasploit server.
Exploits (1)
metasploit
WORKING POC
by Jose Garduno, Dreamlab Technologies AG, Angelo Seiler, Dreamlab Technologies AG · rubypoc
https://github.com/rapid7/metasploit-framework/blob/master/modules/auxiliary/dos/http/metasploit_httphandler_dos.rb
Scores
CVSS v3
7.5
EPSS
0.8788
EPSS Percentile
99.5%
Attack Vector
NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Details
CWE
CWE-400
Status
published
Products (1)
rapid7/metasploit
< 5.0.27
Published
Sep 01, 2020
Tracked Since
Feb 18, 2026