This Metasploit module generates a GET request to the provided web servers and executes an SSRF against the targeted EMBY server. Returns the server header, HTML title attribute and location header (if set). This is useful for rapidly identifying web applications on the internal network using the Emby SSRF vulnerability.
fcd1acfc1aea918108a97ea953c37ce3f9c7c4fea3d526e2df6c4414ad277111