mirror of
https://github.com/0xMarcio/cve.git
synced 2025-05-29 17:50:34 +00:00
19 lines
921 B
Markdown
19 lines
921 B
Markdown
![]() |
### [CVE-2019-5645](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5645)
|
||
|

|
||
|

|
||
|

|
||
|
|
||
|
### Description
|
||
|
|
||
|
By sending a specially crafted HTTP GET request to a listening Rapid7 Metasploit HTTP handler, an attacker can register an arbitrary regular expression. When evaluated, this malicious handler can either prevent new HTTP handler sessions from being established, or cause a resource exhaustion on the Metasploit server.
|
||
|
|
||
|
### POC
|
||
|
|
||
|
#### Reference
|
||
|
No PoCs from references.
|
||
|
|
||
|
#### Github
|
||
|
- https://github.com/404notf0und/CVE-Flow
|
||
|
- https://github.com/marcocastro100/Intrusion_Detection_System-Python
|
||
|
|