
By sending a specially crafted HTTP GET request to a listening Rapid7 Metasploit HTTP handler, an attacker can register an arbitrary regular expression. When evaluated, this malicious handler can either prevent new HTTP handler sessions from being established, or cause a resource exhaustion on the Metasploit server.
Published at: September 01, 2020 at 11:15AM
View on website
More Stories
New vulnerability on the NVD: CVE-2020-19107
New vulnerability on the NVD: CVE-2020-19108
New vulnerability on the NVD: CVE-2020-19109