module

Emby SSRF HTTP Scanner

Disclosed
N/A
Created
Jun 13, 2021

Description

Generates a `GET` request to the provided web servers and executes an SSRF against
the targeted EMBY server. Returns the server header, HTML title attribute and
location header (if set). This is useful for rapidly identifying web applications
on the internal network using the Emby SSRF vulnerability (CVE-2020-26948).

Author

Btnz

Module Options

To display the available options, load the module within the Metasploit console and run the commands 'show options' or 'show advanced':


msf > use auxiliary/scanner/http/emby_ssrf_scanner
msf auxiliary(emby_ssrf_scanner) > show actions
...actions...
msf auxiliary(emby_ssrf_scanner) > set ACTION < action-name >
msf auxiliary(emby_ssrf_scanner) > show options
...show and set options...
msf auxiliary(emby_ssrf_scanner) > run

Title
NEW

Explore Exposure Command

Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.