CVE-2019-5645

HIGH

Rapid7 Metasploit < 5.0.27 - Denial of Service

Title source: rule

Description

By sending a specially crafted HTTP GET request to a listening Rapid7 Metasploit HTTP handler, an attacker can register an arbitrary regular expression. When evaluated, this malicious handler can either prevent new HTTP handler sessions from being established, or cause a resource exhaustion on the Metasploit server.

Exploits (1)

metasploit WORKING POC
by Jose Garduno, Dreamlab Technologies AG, Angelo Seiler, Dreamlab Technologies AG · rubypoc
https://github.com/rapid7/metasploit-framework/blob/master/modules/auxiliary/dos/http/metasploit_httphandler_dos.rb

Scores

CVSS v3 7.5
EPSS 0.8788
EPSS Percentile 99.5%
Attack Vector NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

Details

CWE
CWE-400
Status published
Products (1)
rapid7/metasploit < 5.0.27
Published Sep 01, 2020
Tracked Since Feb 18, 2026