By sending a specially crafted HTTP GET request to a listening Rapid7 Metasploit HTTP handler, an attacker can register an arbitrary regular expression. When evaluated, this malicious handler can either prevent new HTTP handler sessions from being established, or cause a resource exhaustion on the Metasploit server.
Metrics
Affected Vendors & Products
References
Link | Providers |
---|---|
https://github.com/rapid7/metasploit-framework/pull/12433 |
![]() ![]() |
History
No history.

Status: PUBLISHED
Assigner: rapid7
Published:
Updated: 2024-09-17T03:29:11.352Z
Reserved: 2019-01-07T00:00:00
Link: CVE-2019-5645

No data.

Status : Modified
Published: 2020-09-01T15:15:11.983
Modified: 2024-11-21T04:45:17.867
Link: CVE-2019-5645

No data.