4.3
CVSSv2

CVE-2021-41773

Published: 05/10/2021 Updated: 07/11/2023
CVSS v2 Base Score: 4.3 | Impact Score: 2.9 | Exploitability Score: 8.6
CVSS v3 Base Score: 7.5 | Impact Score: 3.6 | Exploitability Score: 3.9
VMScore: 557
Vector: AV:N/AC:M/Au:N/C:P/I:N/A:N

Vulnerability Summary

A NULL pointer dereference was found in Apache httpd mod_h2. The highest threat from this flaw is to system integrity. (CVE-2021-33193) A NULL pointer dereference in httpd allows an unauthenticated remote malicious user to crash httpd by providing malformed HTTP requests. The highest threat from this vulnerability is to system availability. (CVE-2021-34798) An out-of-bounds read in mod_proxy_uwsgi of httpd allows a remote unauthenticated malicious user to crash the service through a crafted request. The highest threat from this vulnerability is to system availability. (CVE-2021-36160) An out-of-bounds write in function ap_escape_quotes of httpd allows an unauthenticated remote malicious user to crash the server or potentially execute code on the system with the privileges of the httpd user, by providing malicious input to the function. (CVE-2021-39275) A Server-Side Request Forgery (SSRF) flaw was found in mod_proxy of httpd. This flaw allows a remote, unauthenticated malicious user to make the httpd server forward requests to an arbitrary server. The attacker could get, modify, or delete resources on other services that may be behind a firewall and inaccessible otherwise. The impact of this flaw varies based on what services and resources are available on the httpd network. (CVE-2021-40438) While fuzzing the 2.4.49 httpd, a new null pointer dereference was detected during HTTP/2 request processing, allowing an external source to DoS the server. This requires a specially crafted request. The vulnerability was recently introduced in version 2.4.49. No exploit is known to the project. (CVE-2021-41524) A path transversal flaw was found in Apache 2.4.49. A remote attacker could use this flaw to map URLs to files outside the expected document root. Additionally this flaw could leak the source of interpreted files like CGI scripts. (CVE-2021-41773) A path transversal and remote code execution flaw was found in Apache HTTP Server 2.4.49 and 2.4.50. A remote attacker could use this flaw to map URLs to files outside the expected document root. Additionally, this flaw could leak the source of interpreted files like CGI scripts. If files outside of these directories are not protected by the usual default configuration "require all denied", these requests can succeed. If CGI scripts are also enabled for these aliased paths, this could allow for remote code execution. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability. This is an incomplete fix for CVE-2021-41773. (CVE-2021-42013)

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

apache http server 2.4.49

fedoraproject fedora 34

fedoraproject fedora 35

oracle instantis enterprisetrack 17.1

oracle instantis enterprisetrack 17.2

oracle instantis enterprisetrack 17.3

netapp cloud backup -

Vendor Advisories

A NULL pointer dereference was found in Apache httpd mod_h2 The highest threat from this flaw is to system integrity (CVE-2021-33193) A NULL pointer dereference in httpd allows an unauthenticated remote attacker to crash httpd by providing malformed HTTP requests The highest threat from this vulnerability is to system availability (CVE-2021-347 ...
A NULL pointer dereference was found in Apache httpd mod_h2 The highest threat from this flaw is to system integrity (CVE-2021-33193) A NULL pointer dereference in httpd allows an unauthenticated remote attacker to crash httpd by providing malformed HTTP requests The highest threat from this vulnerability is to system availability (CVE-2021-347 ...
On October 5, 2021 and October 7, 2021, the Apache Software Foundation released two security announcements for the Apache HTTP Server that disclosed the following vulnerabilities: CVE-2021-41524: Null Pointer Dereference Vulnerability CVE-2021-41773: Path Traversal and Remote Code Execution Vulnerability CVE-2021-42013: Path Traversal and Remote ...
A flaw was found in a change made to path normalization in Apache HTTP Server 2449 An attacker could use a path traversal attack to map URLs to files outside the expected document root If files outside of the document root are not protected by "require all denied" these requests can succeed Additionally this flaw could leak the source of inter ...

Exploits

Apache HTTP Server version 2449 suffers from a path traversal vulnerability ...
This Metasploit module exploits an unauthenticated remote code execution vulnerability which exists in Apache version 2449 (CVE-2021-41773) If files outside of the document root are not protected by ‘require all denied’ and CGI has been explicitly enabled, it can be used to execute arbitrary commands This vulnerability has been reintroduced ...
This is another variant of the Apache HTTP server version 2450 remote code execution exploit ...
This module scans for an unauthenticated RCE vulnerability which exists in Apache version 2449 (CVE-2021-41773) If files outside of the document root are not protected by ‘require all denied’ and CGI has been explicitly enabled, it can be used to execute arbitrary commands (Remote Command Execution) This vulner ...
This module exploit an unauthenticated RCE vulnerability which exists in Apache version 2449 (CVE-2021-41773) If files outside of the document root are not protected by ‘require all denied’ and CGI has been explicitly enabled, it can be used to execute arbitrary commands (Remote Command Execution) This vulnerab ...

Mailing Lists

On Fri, Oct 8, 2021 at 11:46 PM Solar Designer <solar () openwall com> wrote: Noted, thanks for correcting me (again) Regards; Yann ...
Severity: important Description: A flaw was found in a change made to path normalization in Apache HTTP Server 2449 An attacker could use a path traversal attack to map URLs to files outside the expected document root If files outside of the document root are not protected by "require all denied" these requests can succeed Additionally ...
On Fri, Oct 8, 2021 at 11:10 PM Solar Designer <solar () openwall com> wrote: Exactly, thanks Alexander and sorry if I wasn't clear enough For completeness I'll add this tweet/blog from Stefan (OP) about the vulnerability and the fixes in httpd: twittercom/icing/status/1446504661448593408 Regards; Yann ...
Hi oss-security folks, Closing the loop on this one Will Dormann, Hacker Fantastic and I successfully managed to turn this into RCE on both Windows and Linux With mod_cgi (and maybe other similar extensions) enabled, Will showed he could get calc to pop on Windows and HF and I subsequently figured out how to trigger the bug on Linux to reach / ...
On Fri, Oct 08, 2021 at 11:27:37PM +0200, Yann Ylavic wrote: Thanks, but you just did that again For completeness, let's have the actual content on the list, not only links to content That tweet above refers to "Apache httpd 2450 post mortem" at: githubcom/icing/blog/blob/main/httpd-2450md I'm attaching the httpd-2450md f ...
Severity: critical Description: It was found that the fix for CVE-2021-41773 in Apache HTTP Server 2450 was insufficient An attacker could use a path traversal attack to map URLs to files outside the directories configured by Alias-like directives If files outside of these directories are not protected by the usual default configuration " ...
On Sat, Oct 9, 2021 at 8:00 PM Roman Medina-Heigl Hernandez <roman () rs-labs com> wrote: I appreciate this nuance in your tweetS For completeness :) I'll note that most configs (default, vendors, distros) are not vulnerable to the RCE The removal of "<Directory/> require all denied" is an exploit httpd can do nothing about httpd p ...
Hi Yann, Re [1], I think this: "critical: Path traversal and file disclosure vulnerability in Apache HTTP Server 2449 (CVE-2021-41773 <cvemitreorg/cgi-bin/cvenamecgi?name=CVE-2021-41773>)" is still misleading and should read: "critical: Path traversal and *Remote Code Execution* vulnerability in Apache HTTP Ser ...
On Fri, Oct 08, 2021 at 08:37:33PM +0200, Yann Ylavic wrote: Yann is probably referring to the full tweet thread by Roman, not just the one tweet that Roman posted in here Let me correct that: --- Román Medina-Heigl Hernández @roman_soft RCE exploit both for Apache 2449 (CVE-2021-41773) and 2450 (CVE-2021-42013): root@CT406:~# curl 'htt ...

Metasploit Modules

Apache 2.4.49/2.4.50 Traversal RCE scanner

This module scans for an unauthenticated RCE vulnerability which exists in Apache version 2.4.49 (CVE-2021-41773). If files outside of the document root are not protected by ‘require all denied’ and CGI has been explicitly enabled, it can be used to execute arbitrary commands (Remote Command Execution). This vulnerability has been reintroduced in Apache 2.4.50 fix (CVE-2021-42013).

msf > use auxiliary/scanner/http/apache_normalize_path
msf auxiliary(apache_normalize_path) > show actions
    ...actions...
msf auxiliary(apache_normalize_path) > set ACTION < action-name >
msf auxiliary(apache_normalize_path) > show options
    ...show and set options...
msf auxiliary(apache_normalize_path) > run
Apache 2.4.49/2.4.50 Traversal RCE

This module exploit an unauthenticated RCE vulnerability which exists in Apache version 2.4.49 (CVE-2021-41773). If files outside of the document root are not protected by ‘require all denied’ and CGI has been explicitly enabled, it can be used to execute arbitrary commands (Remote Command Execution). This vulnerability has been reintroduced in Apache 2.4.50 fix (CVE-2021-42013).

msf > use exploit/multi/http/apache_normalize_path_rce
msf exploit(apache_normalize_path_rce) > show targets
    ...targets...
msf exploit(apache_normalize_path_rce) > set TARGET < target-id >
msf exploit(apache_normalize_path_rce) > show options
    ...show and set options...
msf exploit(apache_normalize_path_rce) > exploit

Github Repositories

Cyber Security CTF

TryHackMe Name Room Link Writeup Link Advent of Cyber 3 View View Agent Sudo View View Badbyte View View Bolt View View Brooklyn Nine Nine View View Burp Suite Repeater View View Burp Suite:The Basics View View CVE-2021-41773/42013 View View Commited View View Confidential View View Content Discovery View View Corridor View View Cryptography for

CVE-2021-41773 This is the deployment for Apache 2449 which associates with CVE-2021-41773 using Docker container Description: A flaw was found in a change made to path normalization in Apache HTTP Server 2449 An attacker could use a path traversal attack to map URLs to files outside the directories configured by Alias-like directives If files outside of these directorie

Apache HTTP-Server 2.4.49-2.4.50 Path Traversal & Remote Code Execution PoC (CVE-2021-41773 & CVE-2021-42013)

Apache HTTP-Server 2449-2450 Path Traversal &amp; Remote Code Execution Description This is a PoC script for CVE-2021-41773 &amp; CVE-2021-42013 Usage: python3 exploitpy &lt;rhost&gt; &lt;rport&gt; &lt;option&gt; &lt;cmd&gt; | &lt;file-absolute-path&gt; Example: Remote Code Execution py

These Nmap, Python and Ruby scripts detects and exploits CVE-2021-42013 with RCE and local file disclosure.

CVE-2021-42013 Description This script exploits CVE-2021-42013 to print file or/and execute command This script is available for: Nmap Python Ruby Requirements Python python3 python3 Standard Library Ruby Ruby Ruby Standard Library Install git clone githubcom/mauricelambert/CVE-2021-42013git cd CVE-2021-42013 # Python pip install -r requirementstxt

PoC for CVE-2021-41773 with docker to demonstrate

CVE-2021-41773-PoC PoC for CVE-2021-41773 with docker to demonstrate Run Just run /pocsh Make sure you have working docker and docker-compose $ /pocsh Creating network "cve-2021-41773-poc_default" with the default driver Creating cve-2021-41773-poc_web_1 done root:x:0:0:root:/root:/bin/bash daemon:x:1:1:daemon:/usr/sbin:/usr/sbin/nologin bin:x:2:2:bin:/bin:/u

Apache HTTP Server 2.4.49, 2.4.50 - Path Traversal & RCE

Apache HTTP Server 2449, 2450 - Path Traversal &amp; RCE Exploit Author: Lucas Souza ls4ssgithubio/ Vendor Homepage: apacheorg/ Version: 2449, 2450 Tested on: 2449, 2450 CVE : CVE-2021-41773, CVE-2021-42013 Credits: Ash Daulton and the cPanel Security Team Usage /PoCsh targetstxt /etc/passwd /PoCsh targetstxt /bin/sh "id"

知识星球《漏洞百出》最新 20条 Topic

最新 后续爬虫不在提供服务,每周总结可见 【漏洞百出】一周记(211116 ~ 211121) 【漏洞百出】一周记(211122 ~ 211128) 欢迎关注微信公众号 漏洞百出 Topics 20 星球最新20条Topic - 更新于 2021-10-14 10:03:41 作者 内容 发表时间 chybeta 星球链接: 818888225428842 简要内容: PHP 利用未知

CVE-2021-41773 CVE-2021-41773 POC with Docker Configuration To customize the httpdconf file, change line 251 in the &lt;Directory /&gt; section from Require all denied to Require all granted &lt;Directory /&gt; AllowOverride none Require all granted &lt;/Directory&gt; Create a Dockerfile in your project F

Writeups for the SIGFLAG CTF

sigflag CTF 2022 Hardware SPI Flash Easy: SIG{I_READ_THE_INTRO} SPI Flash S01 $ strings flashbin | rg SIG SIGFLAGMEM FAT16 SIGFLAGMEM SIG{S01_FAT_boy_cannot_find_me} eSIG SIG{S01_FAT_boy_cannot_find_me} SPI Flash S02 We can mount the filesystem: $ sudo mount flashbin /mnt/test $ exa -alh /mnt/test Permissions Size User Date Modifi

A Python script to check if an Apache web server is vulnerable to CVE-2021-41773

CVE-2021-41773 scanner This script tests for the path traversal and local file inclusion vulnerability in Apache version 2429, this script doesn't return local files, it merely scans the web server and tells you if it's vulnerable or not Usage: python3 cve-2021-41773-scannerpy IPv4 address

Apache 远程代码执行 (CVE-2021-42013)批量检测工具:Apache HTTP Server是美国阿帕奇(Apache)基金会的一款开源网页服务器。该服务器具有快速、可靠且可通过简单的API进行扩充的特点,发现 Apache HTTP Server 2.4.50 中针对 CVE-2021-41773 的修复不够充分。攻击者可以使用路径遍历攻击将 URL 映射到由类似别名的指令配置的目录之外的文件。如果这些目录之外的文件不受通常的默认配置“要求全部拒绝”的保护,则这些请求可能会成功。如果还为这些别名路径启用了 CGI 脚本,则这可能允许远程代码执行。此问题仅影响 Apache 2.4.49 和 Apache 2.4.50,而不影响更早版本。

漏洞名称 Apache 远程代码执行 (CVE-2021-42013) 漏洞描述 Apache HTTP Server是美国阿帕奇(Apache)基金会的一款开源网页服务器。该服务器具有快速、可靠且可通过简单的API进行扩充的特点,发现 Apache HTTP Server 2450 中针对 CVE-2021-41773 的修复不够充分。攻击者可以使用路径遍历攻击将 URL 映射

This exploit is based on a few CVE vulnerabilities affecting Apache 2.4.49. We use URL-encoded characters to access certain files or otherwise restricted resources on the server. Possible RCE on certain systems as well.

Apache Path Traversal Exploit This exploit is based on a few CVE vulnerabilities affecting Apache 2449 We use URL-encoded characters to access certain files or otherwise restricted resources on the server Possible RCE on certain systems as well Affected CVEs CVE-2021-41773 A flaw was found in a change made to path normalization in Apache HTTP Server 2449 An attacker c

LFI / RCE Unauthenticated - Apache 2.4.49 & 2.4.50

LFI-RCE-Unauthenticated-Apache-2449-2450 LFI / RCE Unauthenticated - Apache 2449 &amp; 2450 Explanation: Apache HTTP Server is an open source web server from the Apache Foundation in the United States The server is fast, reliable, and extensible via a simple API It was discovered that the fix for CVE-2021-41773 in Apache HTTP Server 2450 is insufficient An atta

Przygotowanie Środowiska Docker Desktop Docker to platforma do tworzenia, uruchamiania i zarządzania kontenerami oprogramowania Kontenery to lekkie, samodzielne jednostki oprogramowania, które zawierają wszystko, czego potrzeba do uruchomienia aplikacji, w tym kod, biblioteki, zależności i pliki konfiguracyjne John the Ripper | Hashcat Hash od Serwera Jest to

Taak Cybersecurity

CyberSecurityTaak-El-Jari This repository is for the Cybersecurity &amp; Virtualisation course at [HoGent] (hogentbe) Content On the 5th of October 2021, a CVE detailing a path traversal attack on Apache HTTP Server 2449 was released Assigned the number CVE-2021-41773, it was released with the following description: A flaw was found in a change made to path nor

CVE-2021-41773 (Apache httpd only 2449) For educational purposes only See Reference for the details Run $ git clone githubcom/masahiro331/CVE-2021-41773git $ cd CVE-2021-41773 $ docker build -t cve-2021-41773 $ docker run -d -p 8080:80 cve-2021-41773 Exploit # This vulnerability affects the use of Alias $ curl loca

CVE-2021-41773

CVE-2021-41773-nse By George Labrin (@creadpag) Checks if Server is vulnerable to Apache 2449 CVE-2021-41773 POC Open your favorite Terminal and run these commands Use NMAP First Tab: mv cve-2021-41773nse /usr/share/nmap/scripts/ Second Tab: sudo nmap -Pn --script=cve-2021-41773nse XXXX -p X

CVE-2021-41773 CVE-2021-42013漏洞批量检测工具

CVE-2021-41773_CVE-2021-42013 CVE-2021-41773 CVE-2021-42013多线程漏洞批量检测与利用工具 简介 本工具只可用于安全测试,勿用于非法用途! 工具定位 CVE-2021-41773 CVE-2021-42013多线程漏洞批量检测与利用工具 工具截图 提交反馈 如有好的建议,以及发现BUG。 GitHub issue: githubcom/inbug-team/CVE-2021-41773

GitHub profile README, leveraging GitPortfolio

Organisations Currently, I'm a member of 4 organisations on GitHub Systems Lab (systemscspubro) Canonical MutableSecurity OpenCRS Repositories At the moment, my attention is on 18 repositories Identifier Description Tags Metadata iosifache/awesome-ubuntu-appsec A curated list of awesome appsec tools availabl #security #awesome iosifache/co

CVE-2021-41773 Proof of Concept Quick and dirty proof of concept for checking if hosts vulnerable to CVE-2021-41773 python3 fullpy hoststxt Where hoststxt contains your targets: domaincom blahcom 19216811 It'll print out if the host is vulnerable or not vulnerable Python version of bas

Mitigation/fix of CVE-2021-41773 A Path Traversal And File Disclosure Vulnerability In Apache

Mitigation-CVE-2021-41773- Shell Script to mitigate CVE-2021-41773 A Path Traversal And File Disclosure Vulnerability In Apache Installation wget githubcom/EkamSinghWalia/Mitigation-CVE-2021-41773-git Usage Complete fix and suggested way to mitigate the vulnerabilty This script will upgrade and update system repo and apache bas

Vulnerable configuration Apache HTTP Server version 2.4.49

CVE-2021-41773 Vulnerable service Installation Several options: 1 Docker container docker run -d -p 8080:80 12345qwert123456/apache_2_4_49_cve-2021-41773 2 Dockerfile git clone githubcom/12345qwert123456/CVE-2021-41773git cd CVE-2021-41773-Vulnerable-service/2449 docker build -t apache_2_4_49_cve-2021-41773 docker run -d

Przygotowanie Środowiska Docker Desktop link Docker to platforma do tworzenia, uruchamiania i zarządzania kontenerami oprogramowania Kontenery to lekkie, samodzielne jednostki oprogramowania, które zawierają wszystko, czego potrzeba do uruchomienia aplikacji, w tym kod, biblioteki, zależności i pliki konfiguracyjne John the Ripper | Hashcat link Hash od Serwe

Apache 远程代码执行 (CVE-2021-42013)批量检测工具:Apache HTTP Server是美国阿帕奇(Apache)基金会的一款开源网页服务器。该服务器具有快速、可靠且可通过简单的API进行扩充的特点,发现 Apache HTTP Server 2.4.50 中针对 CVE-2021-41773 的修复不够充分。攻击者可以使用路径遍历攻击将 URL 映射到由类似别名的指令配置的目录之外的文件。如果这些目录之外的文件不受通常的默认配置“要求全部拒绝”的保护,则这些请求可能会成功。如果还为这些别名路径启用了 CGI 脚本,则这可能允许远程代码执行。此问题仅影响 Apache 2.4.49 和 Apache 2.4.50,而不影响更早版本。

漏洞名称 Apache 远程代码执行 (CVE-2021-42013) 漏洞描述 Apache HTTP Server是美国阿帕奇(Apache)基金会的一款开源网页服务器。该服务器具有快速、可靠且可通过简单的API进行扩充的特点,发现 Apache HTTP Server 2450 中针对 CVE-2021-41773 的修复不够充分。攻击者可以使用路径遍历攻击将 URL 映射

CVE-2021-41773 PoC Proof of concept to check if hosts are vulnerable to CVE-2021-41773 Description (cvemitreorg/cgi-bin/cvenamecgi?name=CVE-2021-41773) A flaw was found in a change made to path normalization in Apache HTTP Server 2449-2450 An attacker could use a path traversal attack to map URLs to files outside the expected document root If files outside of

Python script to find PoCs for a given list of CVEs

PoC-Fetcher Description This python script accepts comma separated CVEs and returns a list of POCs for the entered CVEs Usage Enter comma separated CVEs as input The script fetches the POCs from the Github repository nomi-sec Sample Input Enter the CVEids : CVE-2021-41773,CVE-2022-0219 Sample Output CVE-2021-41773 :

Docker vulnerabile per scopi accademici con Apache 2.4.49.

vulnerable_docker_apache_2_4_49 Repository per scopi accademici Docker per l'exploit della vulnerabilità CVE-2021-41773 Per maggiori informazioni: githubcom/BlueTeamSteve/CVE-2021-41773 Credits to: githubcom/BlueTeamSteve DockerHub Link: hubdockercom/r/m96dg/pw_apache_2_4_49

CVE-2021-41773 vulnerable apache version 2.4.49 lab set-up.

apache2449VulnerableLabSetup CVE-2021-41773, Apache HTTP Server 2449 is vulnerable to Path Traversal and Remote Code execution attacks This repo is to simulate the vulnerability

CVE-2021-41773 - Apache HTTP Server 2449 Cara Menjalankan Lab CVE-2021-41773-Path Traversal Install dan jalankan Docker di PC/Laptop anda Clone github repo ini Pergi ke folder Path Traversal Masukan perintah sebagai berikut docker build -t cve-2021-41773-path-traversal dan docker run --rm -dit -p 8888:80 cve-2021-41773-path-traversal Akses menggunakan browser dengan mengun

CVE-2021-41773 Usage [+] python /exploitpy [-OPTIONS] [Target/List of Targets] [+] -h : help [+] -url &lt;target&gt;: specifict the target to check [+] -list &lt;filename&gt;: Scan multiple targets Example -h: help -url: url -list: path to file

This exploit is based on a few CVE vulnerabilities affecting Apache 2.4.49. We use URL-encoded characters to access certain files or otherwise restricted resources on the server. Possible RCE on certain systems as well.

Apache Path Traversal Exploit This exploit is based on a few CVE vulnerabilities affecting Apache 2449 We use URL-encoded characters to access certain files or otherwise restricted resources on the server Possible RCE on certain systems as well Affected CVEs CVE-2021-41773 A flaw was found in a change made to path normalization in Apache HTTP Server 2449 An attacker c

CVE-2021-41773

target/cgi-bin/%2e/%2e%2e/%2e%2e/%2e%2e/etc/hosts id: CVE-2021-41773 info: name: Apache 2449 Exploit author: numanturle severity: high requests: - method: GET path: - "{{BaseURL}}/cgi-bin/%2e/%2e%2e/%2e%2e/%2e%2e/etc/hosts" matchers-condition: and matchers: - type: regex regex: - "127001"

Exploitation of CVE-2021-41773 a Directory Traversal in Apache 2.4.49.

CVE-2021-41773 Exploitation of CVE-2021-41773 a Directory Traversal in Apache 2449

Path Traversal vulnerability in Apache 2.4.49

CVE-2021-41773 Path Traversal vulnerability in Apache 2449 This issue only affects Apache 2449 and not earlier versions MORE INFO pentesterguruji-notesnotionsite/CVE-2021-41733-f58b52f484b94671b319c107ac2739bf

Cve-2021-41773-grabber Path traversal and file disclosure vulnerability in Apache HTTP Server 2449 This script grabber vuln server for cve 2021-41773 from shodan How to Usage : use python 3 install shodan module " pip install shodan" change keyword on script with your shodan keyword need your shodan api key run : python3 apachepy [count of output]

apache_path_traversal This is a PoC for the directory traversal apache vulnerability CVE-2021-41773 that supports multiple hosts Usage : python3 poc_CVE-2021-41773py hoststxt

Mass exploitation CVE-2021-41773 and auto detect possible RCE

CVE-2021-41773 Mass exploitation CVE-2021-41773 and auto detect possible RCE

This is a simple POC for Apache/2.4.49 Path Traversal Vulnerability

CVE-2021-41773 This is a simple poc for Apache Path Traversal Vulnerability Vulnerable versions: Apache/2449 Apache/2450 with mod_cgi disabled

CVE-2021-41773, poc, exploit

Usage file ip-portstxt: 1111:80 node CVE-2021-41773js ip-portstxt

Fast python tool to test apache path traversal CVE-2021-41773 in a List of url

CVE-2021-41773 Fast python tool to test apache path traversal CVE-2021-41773 in a List of url Usage :- create a live urls file and use the flag "-l" python3 apache_path_traversalpy -l urls-listtxt

cve-2021-41773 即 cve-2021-42013 批量检测脚本

cve-2021-41773 and cve-2021-42013 cve-2021-41773 和 cve-2021-42013 批量验证python脚本 运行环境:python3 用法:python3 pocpy urltxt urltxt放待检测的url,存在漏洞的url会被写入successtxt 验证内容很简单,get请求发送cgi-bin/%2e/%2e/%2e/%2e/%2e/%2e/%2e/%2e/%2e/etc/passwd就行,但是我用requests发包发现不行,抓包发

Apache 2.4.49 Path Traversal Vulnerability Checker

CVE-2021-41773 Apache 2449 Path Traversal Vulnerability Checker Example Platform Linux &amp; Windows

用于检测/利用Apache 2449与2450上的目录穿越/命令执行漏洞 使用: 漏洞检测:python3 CVE-2021-41773-42013py -u url 读取文件: python3 CVE-2021-41773-42013py -u url -m read -f filepath 执行命令:python3 CVE-2021-41773-42013py -u url -m exec -c command -s shell(默认/bin/sh)

CVE-2021-41773 Grabber

Apachuk - CVE-2021-41773 Grabber with Shodan Grabber Apache Directory traversal with Shodan Rewrite code from : githubcom/mohwahyudi/cve-2021-41773 How To Use pip3 install requirementstxt python3 mainpy -a [Shodan Api Key] -k [Keyword for shodan] Shodan API Key ? Login / Register to Get your shodan API Key on accountshodanio/ Example python3 mainpy -a

Apache HTTP Server 2.4.49, 2.4.50 - Path Traversal & RCE

CVE-2021-41773 Apache HTTP Server 2449, 2450 - Path Traversal &amp; RCE

Custom made cve exploits

CVE-2021-41773py Apache 2449 Path Traversal

Simple honeypot for CVE-2021-41773 vulnerability

CVE-2021-41773_Honeypot lopqtome/posts/building-highly-interactive-honeypots

CVE-2021-41773 - Apache HTTP Server 2449 Cara Menjalankan Lab CVE-2021-41773-Path Traversal Install dan jalankan Docker di PC/Laptop anda Clone github repo ini Pergi ke folder Path Traversal Masukan perintah sebagai berikut docker build -t cve-2021-41773-path-traversal dan docker run --rm -dit -p 8888:80 cve-2021-41773-path-traversal Akses menggunakan browser dengan mengun

CVE-2021-41773 - Apache HTTP Server 2449 Cara Menjalankan Lab CVE-2021-41773-Path Traversal Install dan jalankan Docker di PC/Laptop anda Clone github repo ini Pergi ke folder Path Traversal Masukan perintah sebagai berikut docker build -t cve-2021-41773-path-traversal dan docker run --rm -dit -p 8888:80 cve-2021-41773-path-traversal Akses menggunakan browser dengan mengun

A automatic scanner to apache 2.4.49

Scanner-CVE-2021-41773 A automatic scanner to apache 2449 • run: go run maingo OR go build maingo &amp;&amp; /main • you can customize your payload • vulnerable hosts are saved Make your lab: 1 Pull Image: sudo docker pull blueteamsteve/cve-2021-41773:no-cgid 2 Run Image: sudo docker run -dit -p 8080:80 blueteamsteve/cve-2021-41773:no-cgid 3 E

Setup vulnerable enviornment

CVE-2021-41773 Setup vulnerable enviornment

Some docker images to play with CVE-2021-41773 and CVE-2021-42013

CVE-2021-41773-Playground Some docker images to play with CVE-2021-41773 and CVE-2021-42013 run docker compose up -d to spin up all the containers Servers will run on ports 8080, 8081, 8082, and 8083 8080 contains an Apache 2449 with CGI disabled 8081 contains an Apache 2449 with CGI enabled 8082 contains an Apache 2450 with CGI disabled 8083 contains an Apache 24

CVE-2021-41773_Exploit 110-1 網路與系統安全 Group 16 資工三 108590029 朱欣雨 資工三 108590050 李浩銘

School project - Please use other repos for actual testing

CVE-2021-41773-exploiter School project - Please use other repos for actual testing

Small PoC of CVE-2021-41773

CVE-2021-41773 Small PoC of CVE-2021-41773 Usage Set target in script Run Reference Exploit on ExploitDB THM Room

cve-2021-41773 Chạy Server $ docker build -t cve-2021-41773 $ docker run --rm -d -p 80:80 cve-2021-41773 Khai thác curl --data "echo;id" 'localhost/cgi-bin/%2e/%2e/%2e/%2e/etc/passwd' Nguyên nhân Lỗi cấu hình trong file httpdconf kết hợp Path traversal =&gt; RCE

CVE-2021-41773 | Apache HTTP Server 2.4.49 is vulnerable to Path Traversal and Remote Code execution attacks

CVE-2021-41773 CVE-2021-41773 According to The National Vulnerability Database (NVD) CVE-2021-41773, Apache HTTP Server 2449 is vulnerable to Path Traversal and Remote Code execution attacks Path Traversal The path traversal vulnerability was introduced due to the new code change added for path normalization ie, for URL paths to remove unwanted or dangerous parts from the

A flaw was found in a change made to path normalization in Apache HTTP Server 2.4.49. An attacker could use a path traversal attack to map URLs to files outside the directories configured by Alias-like directives. If files outside of these directories are not protected by the usual default configuration "require all denied", these requests can s…

CVE-2021-41773-Apache-RCE A flaw was found in a change made to path normalization in Apache HTTP Server 2449 An attacker could use a path traversal attack to map URLs to files outside the directories configured by Alias-like directives If files outside of these directories are not protected by the usual default configuration "require all denied", these requests ca

Metasploit-Framework modules (scanner and exploit) for the CVE-2021-41773 and CVE-2021-42013 (Path Traversal in Apache 2.4.49/2.4.50)

CVE-2021-41773|CVE-2021-42013: Path Traversal Zero-Day in Apache HTTP Server Exploited On October 5, the Apache HTTP Server Project patched CVE-2021-41773, a path traversal and file disclosure vulnerability in Apache HTTP Server, an open-source web server for Unix and Windows that is among the most widely used web servers According to the security advisory, CVE-2021-41773 has

Apache httpd RCE A flaw was found in a change made to path normalization in Apache HTTP Server 2449 An attacker could use a path traversal attack to map URLs to files outside the directories configured by Alias-like directives If files outside these directories are not protected by default configuration "require all denied", these requests can succeed If CGI scri

Poc.py

POC CVE-2021-41773 Poc para testear la vulnerabilidad CVE-2021-41773 correspondiente al servicio apache httpd 2449 POC Open your favorite Terminal and run these commands First Tab: wget rawgithubusercontentcom/TishcaTpx/POC-CVE-2021-41773/main/pocpy Second Tab: python3 pocpy exampledomaincom

mass_cve-2021-41773 MASS CVE-2021-41773 Screenshot Usage ! python3 -m pip install requests pyyhon3 cve-2021-41773py urlisttxt pool Note ! results will be automatically saved in vulntxt u can add a common dir on githubcom/i6c/MASS_CVE-2021-41773/blob/main/cve-2021-41773py#L51 References wwwtenablecom/blog/cve-2021-41773-path-traversal-zero-day-in-apa

Apache (Linux) CVE-2021-41773/2021-42013 Mass Vulnerability Checker

Apache (Linux) CVE-2021-41773/2021-42013 Mass Vulnerability Checker Automatic Mass Tool for checking vulnerability in Apache (Linux) 2449/50Using GNU Parallel You must have parallel for running this tool Install Parallel Linux : command # apt-get install parallel -y Windows : You can install WSL (windows subsystem linux) then do install like linuxif you want use windows, i

php Thinkphp Apache CVE-2021-41773 oa landray_oa(蓝凌oa) 前台任意文件读取 seeyon_oa(致远oa) yonyou(用友) 用友NC BeanShell RCE php Thinkphp Apache CVE-2021-41773 影响版本 Apache HTTP SERVER 2449 参考 oa landray_oa(蓝凌oa) 前台任意文件读取 seeyon_oa(致远oa) yonyou(用友) 用友NC BeanShell RCE 影响版本 用友NC65 参考

CVE-2021-41773 Path traversal and file disclosure vulnerability in Apache HTTP Server 2449 This script test Apache HTTP Server 2449 Usage: CVE-2021-41773py options Only for one IP: python CVE-2021-41773py IP_address Option -f For IP list in file Example: python CVE-2021-41773py -f IP_address_list_filename Option -s For IP subnet Example: python CVE-2021-41773py -s 192

CVE-2021-41773: Path Traversal Zero-Day in Apache HTTP Server Exploited

CVE-2021-41773 CVE-2021-41773: Path Traversal Zero-Day in Apache HTTP Server Exploited Apache HTTP Server CVE-2021-41773 Exploited in the Wild CVE-2021-42013: Path Traversal and Remote Code Execution in Apache HTTP Server 2449 and 2450 (incomplete fix of CVE-2021-41773) Shodan oneliner shodan search Apache Server 2449 | awk '{print $1":"$2}' | while

Tool check: CVE-2021-41773, CVE-2021-42013, CVE-2020-17519

SimplesApachePathTraversal Simples Apache Path Traversal It's a simple tool for test vulnerability Apache Path Traversal blogmrcl0wncom/2021/10/uma-simples-tool-para-apache-pathhtml Autor: MrCl0wn Blog: blogmrcl0wncom GitHub: githubcom/MrCl0wnLab Twitter: twittercom/MrCl0wnLab Email: mrcl0wnlab\@\gma

CVE-2021-41773 🐛 Path traversal and file disclosure vulnerability in Apache HTTP Server 2449 A flaw was found in a change made to path normalization in Apache HTTP Server 2449 An attacker could use a path traversal attack to map URLs to files outside the directories configured by Alias-like directives If files outside of these directories are not protected by the usual

CVE-2021-41773 | CVE-2021-42013 Exploit Tool (Apache/2.4.49-2.4.50)

Exploit for CVE-2021-41773 and CVE-2021-42013 Path traversal attack and RCE in Apache/2449-2450 Features -&gt; Take a list of urls -&gt; Works for both CGI and non-CGI -&gt; Works for Apache/2449 - 2450 Usage $ git clone githubcom/CalfCrusher/Path-traversal-RCE-Apache-2449-2450-Exploit $ cd Path-traversal-RCE-Apache-2449-2450-Exploit &am

CVE-2021-42013 This is the deployment for Apache 2450 which associates with CVE-2021-42013 using Docker container Description: It was found that the fix for CVE-2021-41773 in Apache HTTP Server 2450 was insufficient An attacker could use a path traversal attack to map URLs to files outside the directories configured by Alias-like directives If files outside of these dire

CVE-2021-41773 🐛 Path traversal and file disclosure vulnerability in Apache HTTP Server 2449 A flaw was found in a change made to path normalization in Apache HTTP Server 2449 An attacker could use a path traversal attack to map URLs to files outside the directories configured by Alias-like directives If files outside of these directories are not protected by the usual

Meaningful outline of the knowledge you need in order to obtain the OSCP certification

OSCP This repository contains useful information related to the OSCP certification Specifically, I have organized all the knowledge you need to know in order to obtain the OSCP certification into nine different modules For each module, you will find a specific folder containing information regarding that module The modules are listed below NOTE: Currently there's not m

CVE-2021-41773 Path traversal and file disclosure vulnerability in Apache HTTP Server 2449 Usage python3 apache2-4-49py -h python3 apache2-4-49py --check --single examplecom Reference wwwtenablecom/blog/cve-2021-41773-path-traversal-zero-day-in-apache-http-server-exploited nvdnistgov/vuln/detail/CVE-2021-41773

apache路径穿越漏洞poc&exp

CVE-2021-41773 go语言poc&amp;exp项目。 声明:该项目来自作者日常学习笔记。 请勿利用相关技术以及工具从事非法测试,如因此产生的一切不良后果作者无关。 使用: /main -u &lt;url&gt; 单个url /main -u &lt;url&gt; -c &lt;command&gt; 单个url执行单个命令 /main -f &lt;file&gt;

CVE-2021-41773 Docker $ sudo docker build -t &lt;image_name&gt; $ sudo docker run -d -t -p 80:80 --name &lt;container_name&gt; &lt;image_name&gt; /bin/bash $ sudo docker exec -it &lt;container_name&gt; /bin/apachectl -k restart To access docker container for custom config file $ docker exec -it &lt;c

Web API Security Detection System

Web-API-Security-Detection-System Overall Architecture 1、The Interface Collector is responsible for receiving the Web API interfaces that need to be tested and importing them into memory for the Parser to retrieve and parse 2、The Parser is responsible for parsing the Web API interface packets, ie, parsing the HTTP packets and storing them into the class objects implemen

Apache (Linux) CVE-2021-41773/2021-42013 Mass Vulnerability Checker Automatic Mass Tool for checking vulnerability in Apache (Linux) 2449/50Using GNU Parallel You must have parallel for running this tool Install Parallel Linux : command # apt-get install parallel -y Windows : You can install WSL (windows subsystem linux) then do install like linuxif you want use windows, i

A repo containing exploits and POC of multiple CVEs

cve-exploits A repo containing exploits and POC of multiple CVEs Contents CVE-2021-42013 is a notable vulnerability discovered in Apache HTTP Server versions 2449 and 2450 It was observed that the solution for an earlier vulnerability, CVE-2021-41773, in Apache HTTP Server 2450 was not adequate This led to the emergence of CVE-2021-42013, which allows an attacker to exp

Path traversal in Apache HTTP Server 2.4.49 (CVE-2021-41773)

CVE-2021-41773 Path traversal in Apache HTTP Server 2449 (CVE-2021-41773) For educational purposes only Test Set up the PoC environment $ docker build -t cve-2021-41773 $ docker run --rm -dit -p 8000:80 cve-2021-41773 Confirm it works $ curl localhost:8000 &lt;html&gt;&lt;body&gt;&lt;h1&gt;It works!&

POC-CVE-2021-41773 On the 5th of October 2021, a CVE detailing a path traversal attack on Apache HTTP Server v2449 was released Assigned the number CVE-2021-41773, it was released with the following description: A flaw was found in a change made to path normalization in Apache HTTP Server 2449 An attacker could use a path traversal attack to map URLs to files outside the

《Go语言自研安全工具》

Go语言自研安全工具 本项目用于记录自己使用Go语言开发的一些小型的安全相关工具。作者不会对程序添加任何形式的后门,程序不会对系统产生任何的破坏。但工具仅适用于甲方自查或乙方在授权的情况下进行测试。请各位师傅放心使用,风险自担。本人太菜,代码写的太烂,所有程序

These Metasploit, Nmap, Python and Ruby scripts detects and exploits CVE-2021-41773 with RCE and local file disclosure.

CVE-2021-41773 Description This script exploits CVE-2021-41773 to print file or/and execute command This script is available for: Nmap Python Ruby Requirements Python python3 python3 Standard Library Ruby Ruby Ruby Standard Library Install git clone githubcom/mauricelambert/CVE-2021-41773git cd CVE-2021-41773 # Python pip install -r requirementstxt

A PoC exploit for CVE-2021-42013 - Apache 2.4.49 & 2.4.50 Remote Code Execution

🚨 CVE-2021-42013 - Apache 2449 &amp; 2450 Remote Code Execution 🚨 CVE-2021-42013 builds upon the previously identified vulnerability, CVE-2021-41773 Despite the Apache team's efforts to address CVE-2021-41773 in version 2450, subsequent investigations revealed that the fix fell short of fully mitigating the security risk This vulnerability exploits a path

Exploit for path transversal vulnerability in apache

Exploit for Apache2 Exploit for path transversal vulnerability in apache Version: 2449 CVE: CVE-2021-41773 Pull docker image docker pull httpd:2449-alpine Configure apache In /usr/local/apache2/conf/httpdconf replace these entries &lt;Directory /&gt; AllowOverride none - Require all denied + #Require all denied

Mitigation/fix of CVE-2021-41773 A Path Traversal And File Disclosure Vulnerability In Apache

Mitigation-CVE-2021-41773- Shell Script to mitigate CVE-2021-41773 A Path Traversal And File Disclosure Vulnerability In Apache Installation wget githubcom/EkamSinghWalia/Mitigation-CVE-2021-41773-git Usage Complete fix and suggested way to mitigate the vulnerabilty This script will upgrade and update system repo and apache bas

CVE-2021-41773 Path Traversal vulnerability in Apache 2.4.49.

cve-2021-41773 CVE-2021-41773 Path Traversal vulnerability in Apache 2449 RCE POC PoC Payload curl -s --path-as-is ":[PORT]/icons/%2e/%2e%2e/%2e%2e/%2e%2e/etc/passwd curl -s --path-as-is --data "echo;Command" "[IP]:[PORT]/cgi-bin/%2e/%2e%2e/%2e%2e/bin/sh Follow us Vulnmachines YouTube Twitter Facebook LinkedIn

Apache2 2.4.49 - LFI & RCE Exploit - CVE-2021-41773

CVE-2021-41773 Apache2 2449 - LFI &amp; RCE Exploit Info # Exploit Title: Apache HTTP Server 2449 - Path Traversal &amp; Remote Code Execution (RCE) # Exploit Author: Gaurav Raj gauravrajxyz bloggauravrajxyz # Vendor Homepage: apacheorg/ # Version: 2449 # Tested on: 2449 # CVE : CVE-2021-41773

MASS CVE-2021-41773

mass_cve-2021-41773 MASS CVE-2021-41773 Screenshot Usage ! python3 -m pip install requests pyyhon3 cve-2021-41773py urlisttxt pool Note ! results will be automatically saved in vulntxt u can add a common dir on mass_cve-2021-41773/cve-2021-41773py Line 49 in 4579bdb common_dir

Apache HTTP Server 2.4.49, 2.4.50 - Path Traversal & RCE

Apache HTTP Server 2449, 2450 - Path Traversal &amp; RCE Exploit Author: Lucas Souza ls4ssgithubio/ Vendor Homepage: apacheorg/ Version: 2449, 2450 Tested on: 2449, 2450 CVE : CVE-2021-41773, CVE-2021-42013 Credits: Ash Daulton and the cPanel Security Team Usage /PoCsh targetstxt /etc/passwd /PoCsh targetstxt /bin/sh "id"

Vulnerable docker images for CVE-2021-41773

Vulnerable docker images for CVE-2021-41773 Apache path traversal This vulnerabiltiy only applies to version 2449 that have specific non-default configs In certain situations this can result in either file read or code execution twittercom/ptswarm/status/1445376079548624899 Vulnerable file read config Containers can be pulled directly from Docker Hub using docker

Vulnerable configuration Apache HTTP Server version 2.4.49

CVE-2021-41773 Vulnerable service Installation Several options: 1 Docker container docker run -d -p 8080:80 12345qwert123456/apache_2_4_49_cve-2021-41773 2 Dockerfile git clone githubcom/12345qwert123456/CVE-2021-41773git cd CVE-2021-41773-Vulnerable-service/2449 docker build -t apache_2_4_49_cve-2021-41773 docker run -d

Vulnerable configuration Apache HTTP Server version 2.4.49

CVE-2021-41773 Vulnerable service Installation Several options: 1 Docker container docker run -d -p 8080:80 12345qwert123456/apache_2_4_49_cve-2021-41773 2 Dockerfile git clone githubcom/12345qwert123456/CVE-2021-41773git cd CVE-2021-41773-Vulnerable-service/2449 docker build -t apache_2_4_49_cve-2021-41773 docker run -d

CVE-2021-41773 Fast python tool to test apache path traversal CVE-2021-41773 in a List of url Usage :- create a live urls file and use the flag "-l" python3 apache_path_traversalpy -l urls-listtxt

python编写的apache路径穿越poc&exp

CVE-2021-41773 python语言poc&amp;exp项目。 声明:该项目来自作者日常学习笔记。 请勿利用相关技术以及工具从事非法测试,如因此产生的一切不良后果作者无关。 使用: python mainpy -h 查看帮助 python mainpy -u 利用漏洞 python mainpy -f urltxt 批量测试漏洞是否存在 python mainpy -f urltxt -o b

CVE-2021-41773 A flaw was found in a change made to path normalization in Apache HTTP Server 2449-2450 An attacker could use a path traversal attack to map URLs to files outside the expected document root If files outside of the document root are not protected by "require all denied" these requests can succeed Additionally this flaw could leak the source of int

Vulnerable configuration Apache HTTP Server version 2.4.49

CVE-2021-41773 Vulnerable service Installation Several options: 1 Docker container docker run -d -p 8080:80 12345qwert123456/apache_2_4_49_cve-2021-41773 2 Dockerfile git clone githubcom/12345qwert123456/CVE-2021-41773git cd CVE-2021-41773-Vulnerable-service/2449 docker build -t apache_2_4_49_cve-2021-41773 docker run -d

Recent Articles

Brewdog might make an OK pint but its security sucks: Flaw opened door to free beers for anyone
The Register • Iain Thomson in San Francisco • 11 Oct 2021

Get our weekly newsletter Plus two failings this week at Apache and Twitch and nostalgia for Flash fans

In brief Hipster beer maker Brewdog has been caught out by a basic, but potentially very expensive, security problem, and the team that discovered it says the Scottish tipple-merchant's response was hardly encouraging. Research by security shop Pen Test Partners found that the Brewdog mobile app used the same hard-coded API Bearer Token to log in every single customer on their mobiles. This would allow anyone to access and use other people's accounts, including 200,000 "Equity for Punks" shareho...

Running a recent Apache web server version? You probably need to patch it. Now
The Register • Richard Speed • 06 Oct 2021

Get our weekly newsletter Unless you want to leak like a sieve

The Apache Software Foundation has hurried out a patch to address a pair of HTTP Web Server vulnerabilities, at least one of which is already being actively exploited. Apache's HTTP Server is widely used, and the vulnerabilities, CVE-2021-41524 and CVE-2021-41773, aren't great. The latter, a path traversal and file disclosure flaw, is particularly problematic. The former was reported to Apache's security team on 17 September and can be exploited by an external source to DoS a server with a speci...

FBI: Beware of thieves building Androxgh0st botnets using stolen creds
The Register

Topics Security Off-Prem On-Prem Software Offbeat Special Features Vendor Voice Vendor Voice Resources Infecting networks via years-old CVEs that should have been patched by now

Crooks are exploiting years-old vulnerabilities to deploy Androxgh0st malware and build a cloud-credential stealing botnet, according to the FBI and the Cybersecurity and Infrastructure Security Agency (CISA). In a joint warning issued on Tuesday, the US government agencies said the Python-scripted malware primarily targets .env files that contain user credentials for AWS, Microsoft Office 365, SendGrid, and Twilio. After scanning and exploiting these stolen credentials, Androxgh0st can also be ...

References

CWE-22https://httpd.apache.org/security/vulnerabilities_24.htmlhttp://www.openwall.com/lists/oss-security/2021/10/05/2http://packetstormsecurity.com/files/164418/Apache-HTTP-Server-2.4.49-Path-Traversal.htmlhttp://www.openwall.com/lists/oss-security/2021/10/07/1http://packetstormsecurity.com/files/164418/Apache-HTTP-Server-2.4.49-Path-Traversal-Remote-Code-Execution.htmlhttp://www.openwall.com/lists/oss-security/2021/10/07/6https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-apache-httpd-pathtrv-LAzg68cZhttp://www.openwall.com/lists/oss-security/2021/10/08/1http://www.openwall.com/lists/oss-security/2021/10/08/2http://www.openwall.com/lists/oss-security/2021/10/08/4http://www.openwall.com/lists/oss-security/2021/10/08/3http://www.openwall.com/lists/oss-security/2021/10/08/6http://www.openwall.com/lists/oss-security/2021/10/08/5http://www.openwall.com/lists/oss-security/2021/10/09/1http://www.openwall.com/lists/oss-security/2021/10/11/4http://www.openwall.com/lists/oss-security/2021/10/15/3http://www.openwall.com/lists/oss-security/2021/10/16/1http://packetstormsecurity.com/files/164629/Apache-2.4.49-2.4.50-Traversal-Remote-Code-Execution.htmlhttps://security.netapp.com/advisory/ntap-20211029-0009/http://packetstormsecurity.com/files/164941/Apache-HTTP-Server-2.4.50-Remote-Code-Execution.htmlhttps://www.oracle.com/security-alerts/cpujan2022.htmlhttps://security.gentoo.org/glsa/202208-20https://lists.apache.org/thread.html/r6abf5f2ba6f1aa8b1030f95367aaf17660c4e4c78cb2338aee18982f%40%3Cusers.httpd.apache.org%3Ehttps://lists.apache.org/thread.html/r98d704ed4377ed889d40479db79ed1ee2f43b2ebdd79ce84b042df45%40%3Cannounce.apache.org%3Ehttps://lists.apache.org/thread.html/r7c795cd45a3384d4d27e57618a215b0ed19cb6ca8eb070061ad5d837%40%3Cannounce.apache.org%3Ehttps://lists.apache.org/thread.html/rb5b0e46f179f60b0c70204656bc52fcb558e961cb4d06a971e9e3efb%40%3Cusers.httpd.apache.org%3Ehttps://lists.apache.org/thread.html/r17a4c6ce9aff662efd9459e9d1850ab4a611cb23392fc68264c72cb3%40%3Ccvs.httpd.apache.org%3Ehttps://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/RMIIEFINL6FUIOPD2A3M5XC6DH45Y3CC/https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/WS5RVHOIIRECG65ZBTZY7IEJVWQSQPG3/https://nvd.nist.govhttps://alas.aws.amazon.com/AL2/ALAS-2021-1716.htmlhttps://github.com/vrbait1107/CTF_WRITEUPS