Real-time collaboration for Jupyter Notebooks, Linux Terminals, LaTeX, VS Code, R IDE, and more,
all in one place.
Real-time collaboration for Jupyter Notebooks, Linux Terminals, LaTeX, VS Code, R IDE, and more,
all in one place.
Path: blob/master/documentation/modules/auxiliary/scanner/http/emby_ssrf_scanner.md
Views: 11784
Vulnerable Application
This module has been tested on Emby Media Server versions older than 4.5.
Description
Generates a GET
request to the provided web servers and executes an SSRF against the targeted EMBY server. Returns the server header, HTML title, and location header. This is useful for rapidly identifying web applications on the internal network using the Emby SSRF vulnerability (CVE-2020-26948).
Verification Steps
Do:
use auxiliary/scanner/http/emby_ssrf_scanner
Do:
set rhosts [ips]
Do:
set emby_server [emby_server_ip]
Do:
run
Options
PORTS
Select which ports to check for HTTP servers internal to the Emby server. Defaults to 80,8080,8081,8888
.
EMBY_SERVER
IP address of the Emby server to use. Required.
EMBY_PORT
Emby server access port. Defaults to 8096.
SHOW_TITLES
If set to false
, will not show the titles on the console as they are grabbed. Defaults to true
.
STORE_NOTES
If set to false
, will not store the captured information in notes. Use notes -t http.title
to view. Defaults to true
.