CVE-2019-5645
Rapid7 Metasploit HTTP Handler Denial of Service
Severity Score
7.5
*CVSS v3.1
Exploit Likelihood
*EPSS
Affected Versions
*CPE
Public Exploits
1
*Multiple Sources
Exploited in Wild
-
*KEV
Decision
-
*SSVC
Descriptions
By sending a specially crafted HTTP GET request to a listening Rapid7 Metasploit HTTP handler, an attacker can register an arbitrary regular expression. When evaluated, this malicious handler can either prevent new HTTP handler sessions from being established, or cause a resource exhaustion on the Metasploit server.
Mediante el envío de una petición GET HTTP especialmente diseñada hacia un manejador HTTP de Rapid7 Metasploit que esté escuchando, un atacante puede registrar una expresión regular arbitraria. Cuando se evalúa, este manejador malicioso puede impedir que sean establecidas nuevas sesiones del manejador HTTP o causar un agotamiento de recursos en el servidor de Metasploit
*Credits:
This issue was reported by Jose Garduno of Dreamlab Technologies, AG
CVSS Scores
Attack Vector
Attack Complexity
Privileges Required
User Interaction
Scope
Confidentiality
Integrity
Availability
Attack Vector
Attack Complexity
Authentication
Confidentiality
Integrity
Availability
* Common Vulnerability Scoring System
SSVC
- Decision:-
Exploitation
Automatable
Tech. Impact
* Organization's Worst-case Scenario
Timeline
- 2019-01-07 CVE Reserved
- 2020-09-01 CVE Published
- 2024-08-31 First Exploit
- 2024-09-17 CVE Updated
- 2025-01-13 EPSS Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
CWE
- CWE-400: Uncontrolled Resource Consumption
CAPEC
References (2)
URL | Tag | Source |
---|
URL | Date | SRC |
---|---|---|
https://packetstorm.news/files/id/180527 | 2024-08-31 |
URL | Date | SRC |
---|---|---|
https://github.com/rapid7/metasploit-framework/pull/12433 | 2020-09-08 |
URL | Date | SRC |
---|
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Rapid7 Search vendor "Rapid7" | Metasploit Search vendor "Rapid7" for product "Metasploit" | <= 5.0.27 Search vendor "Rapid7" for product "Metasploit" and version " <= 5.0.27" | - |
Affected
|