支持本站 — 捐款将帮助我们持续运营

目标:1000 元,已筹:640

64.0%
一、 漏洞 CVE-2021-41773 基础信息
漏洞信息
                                        # Apache HTTP Server 2.4.49中的路径穿越和文件泄露漏洞

## 概述
Apache HTTP Server 2.4.49 中存在一个路径规范化更改中的漏洞。该漏洞允许攻击者利用路径遍历攻击访问配置的别名目录之外的文件。如果这些文件没有通过默认配置 "require all denied" 进行保护,这些请求可能会成功。此外,如果为这些别名路径启用了 CGI 脚本,可能会导致远程代码执行。

## 影响版本
- 仅影响 Apache 2.4.49 版本。
- Apache HTTP Server 2.4.50 的修复不完整,需参考 CVE-2021-42013。

## 细节
### 漏洞原理
- 攻击者可以通过路径遍历攻击,将 URL 映射到别名配置目录之外的文件。
- 如果这些文件没有通过默认的 "require all denied" 设置进行保护,请求可能会成功。

### 影响
- 可能会导致敏感文件泄露或远程代码执行。
- 此漏洞已知被野外攻击利用。

## 影响
- 敏感文件泄露和远程代码执行。
- 威胁级别较高,且已有实际攻击案例。
                                        
神龙判断

是否为 Web 类漏洞:

判断理由:

是。这个漏洞存在于Apache HTTP Server 2.4.49版本中,具体表现为路径规范化的更改导致了路径穿越攻击,允许攻击者通过URL映射到配置目录之外的文件。如果这些文件未被默认配置"require all denied"保护,攻击者的请求可能会成功,甚至可能在启用了CGI脚本的情况下执行远程代码。此漏洞已被证实被利用。
提示
尽管我们采用了先进的大模型技术,但其输出仍可能包含不准确或过时的信息。
神龙会尽力确保数据准确,但也请结合实际情况进行甄别与判断。
神龙祝您一切顺利!
漏洞标题
Path traversal and file disclosure vulnerability in Apache HTTP Server 2.4.49
来源:美国国家漏洞数据库 NVD
漏洞描述信息
A flaw was found in a change made to path normalization in Apache HTTP Server 2.4.49. An attacker could use a path traversal attack to map URLs to files outside the directories configured by Alias-like directives. If files outside of these directories are not protected by the usual default configuration "require all denied", these requests can succeed. If CGI scripts are also enabled for these aliased pathes, this could allow for remote code execution. This issue is known to be exploited in the wild. This issue only affects Apache 2.4.49 and not earlier versions. The fix in Apache HTTP Server 2.4.50 was found to be incomplete, see CVE-2021-42013.
来源:美国国家漏洞数据库 NVD
CVSS信息
N/A
来源:美国国家漏洞数据库 NVD
漏洞类别
对路径名的限制不恰当(路径遍历)
来源:美国国家漏洞数据库 NVD
漏洞标题
Apache HTTP Server 路径遍历漏洞
来源:中国国家信息安全漏洞库 CNNVD
漏洞描述信息
Apache HTTP Server是美国阿帕奇(Apache)基金会的一款开源网页服务器。该服务器具有快速、可靠且可通过简单的API进行扩充的特点。 Apache HTTP Server 2.4.49版本存在路径遍历漏洞,攻击者可利用该漏洞使用路径遍历攻击将URL映射到预期文档根以外的文件。
来源:中国国家信息安全漏洞库 CNNVD
CVSS信息
N/A
来源:中国国家信息安全漏洞库 CNNVD
漏洞类别
路径遍历
来源:中国国家信息安全漏洞库 CNNVD
二、漏洞 CVE-2021-41773 的公开POC
#POC 描述源链接神龙链接
1CVE-2021-41773 Path Traversal vulnerability in Apache 2.4.49.https://github.com/Vulnmachines/cve-2021-41773POC详情
2CVE-2021-41773https://github.com/numanturle/CVE-2021-41773POC详情
3Path traversal in Apache HTTP Server 2.4.49 (CVE-2021-41773) https://github.com/knqyf263/CVE-2021-41773POC详情
4Nonehttps://github.com/ZephrFish/CVE-2021-41773-PoCPOC详情
5Nonehttps://github.com/iilegacyyii/PoC-CVE-2021-41773POC详情
6Nonehttps://github.com/masahiro331/CVE-2021-41773POC详情
7Exploitation of CVE-2021-41773 a Directory Traversal in Apache 2.4.49.https://github.com/j4k0m/CVE-2021-41773POC详情
8Poc.py https://github.com/TishcaTpx/POC-CVE-2021-41773POC详情
9Nonehttps://github.com/lorddemon/CVE-2021-41773-PoCPOC详情
10Apache HTTP Server 2.4.49, 2.4.50 - Path Traversal & RCEhttps://github.com/Ls4ss/CVE-2021-41773_CVE-2021-42013POC详情
11CVE-2021-41773 POC with Dockerhttps://github.com/itsecurityco/CVE-2021-41773POC详情
12PoC for CVE-2021-41773 with docker to demonstratehttps://github.com/habibiefaried/CVE-2021-41773-PoCPOC详情
13CVE-2021-41773https://github.com/creadpag/CVE-2021-41773-POCPOC详情
14CVE-2021-41773.nsehttps://github.com/TAI-REx/cve-2021-41773-nsePOC详情
15CVE-2021-41773 playgroundhttps://github.com/blasty/CVE-2021-41773POC详情
16Path Traversal vulnerability in Apache 2.4.49https://github.com/PentesterGuruji/CVE-2021-41773POC详情
17Path traversal and file disclosure vulnerability in Apache HTTP Server 2.4.49 (CVE-2021-41773)https://github.com/jbovet/CVE-2021-41773POC详情
18Nonehttps://github.com/mohwahyudi/cve-2021-41773POC详情
19CVE-2021-41773 的复现https://github.com/1nhann/CVE-2021-41773POC详情
20Nonehttps://github.com/ranggaggngntt/CVE-2021-41773POC详情
21Vulnerable docker images for CVE-2021-41773https://github.com/BlueTeamSteve/CVE-2021-41773POC详情
22Metasploit-Framework modules (scanner and exploit) for the CVE-2021-41773 and CVE-2021-42013 (Path Traversal in Apache 2.4.49/2.4.50)https://github.com/Zeop-CyberSec/apache_normalize_pathPOC详情
23Nonehttps://github.com/r00tVen0m/CVE-2021-41773POC详情
24exploit to CVE-2021-41773https://github.com/n3k00n3/CVE-2021-41773POC详情
25Nonehttps://github.com/fnatalucci/CVE-2021-41773-RCEPOC详情
26Apache 2.4.49https://github.com/AssassinUKG/CVE-2021-41773POC详情
27Simple script realizado en bash, para revisión de múltiples hosts para CVE-2021-41773 (Apache)https://github.com/jheeree/Simple-CVE-2021-41773-checkerPOC详情
28Apache HTTPd (2.4.49) – Local File Disclosure (LFI)https://github.com/orangmuda/CVE-2021-41773POC详情
29A framework for bug hunting or pentesting targeting websites that have CVE-2021-41773 Vulnerability in public https://github.com/HightechSec/scarce-apache2POC详情
30CVE-2021-41773, poc, exploithttps://github.com/vinhjaxt/CVE-2021-41773-exploitPOC详情
31CVE-2021-41773 exploit PoC with Docker setup.https://github.com/sixpacksecurity/CVE-2021-41773POC详情
32Nonehttps://github.com/Hattan515/POC-CVE-2021-41773POC详情
33CVE-2021-41773: Path Traversal Zero-Day in Apache HTTP Server Exploitedhttps://github.com/twseptian/cve-2021-41773POC详情
34CVE-2021-41773https://github.com/noflowpls/CVE-2021-41773POC详情
35Apache 2.4.49 Exploithttps://github.com/McSl0vv/CVE-2021-41773POC详情
36Nonehttps://github.com/shiomiyan/CVE-2021-41773POC详情
37MASS CVE-2021-41773https://github.com/justakazh/mass_cve-2021-41773POC详情
38Mass exploitation CVE-2021-41773 and auto detect possible RCEhttps://github.com/Sakura-nee/CVE-2021-41773POC详情
39This is a simple POC for Apache/2.4.49 Path Traversal Vulnerabilityhttps://github.com/shellreaper/CVE-2021-41773POC详情
40Exploit for Apache 2.4.49https://github.com/0xRar/CVE-2021-41773POC详情
41Nonehttps://github.com/pisut4152/Sigma-Rule-for-CVE-2021-41773-and-CVE-2021-42013-exploitation-attemptPOC详情
42A Zeek package which raises notices for Path Traversal/RCE in Apache HTTP Server 2.4.49 (CVE-2021-41773) and 2.4.50 (CVE-2021-42013)https://github.com/corelight/CVE-2021-41773POC详情
43Fast python tool to test apache path traversal CVE-2021-41773 in a List of url https://github.com/zeronine9/CVE-2021-41773POC详情
44A Python script to check if an Apache web server is vulnerable to CVE-2021-41773https://github.com/b1tsec/CVE-2021-41773POC详情
45POChttps://github.com/superzerosec/CVE-2021-41773POC详情
46Apache (Linux) CVE-2021-41773/2021-42013 Mass Vulnerability Checkerhttps://github.com/im-hanzou/apachrotPOC详情
47CVE-2021-41773 CVE-2021-42013漏洞批量检测工具https://github.com/inbug-team/CVE-2021-41773_CVE-2021-42013POC详情
48cve-2021-41773 即 cve-2021-42013 批量检测脚本https://github.com/5gstudent/cve-2021-41773-and-cve-2021-42013POC详情
49Apache 2.4.49 Path Traversal Vulnerability Checker https://github.com/EagleTube/CVE-2021-41773POC详情
50Nonehttps://github.com/cgddgc/CVE-2021-41773-42013POC详情
51CVE-2021-41773 Grabberhttps://github.com/apapedulimu/ApachukPOC详情
52 Apache HTTP Server 2.4.49, 2.4.50 - Path Traversal & RCEhttps://github.com/scarmandef/CVE-2021-41773POC详情
53Path Traversal and RCE in Apache HTTP Server 2.4.49 https://github.com/0xAlmighty/CVE-2021-41773-PoCPOC详情
54critical: Path Traversal and Remote Code Execution in Apache HTTP Server 2.4.49 and 2.4.50 (incomplete fix of CVE-2021-41773) (CVE-2021-42013)https://github.com/ksanchezcld/httpd-2.4.49POC详情
55Tool check: CVE-2021-41773, CVE-2021-42013, CVE-2020-17519https://github.com/MrCl0wnLab/SimplesApachePathTraversalPOC详情
56apache httpd path traversal checker(CVE-2021-41773 / CVE-2021-42013)https://github.com/theLSA/apache-httpd-path-traversal-checkerPOC详情
57The first vulnerability with the CVE identifier CVE-2021-41773 is a path traversal flaw that exists in Apache HTTP Server 2.4.49.https://github.com/LudovicPatho/CVE-2021-41773POC详情
58Simple honeypot for CVE-2021-41773 vulnerabilityhttps://github.com/lopqto/CVE-2021-41773_HoneypotPOC详情
59Lab setup for CVE-2021-41773 (Apache httpd 2.4.49) and CVE-2021-42013 (Apache httpd 2.4.50).https://github.com/zerodaywolf/CVE-2021-41773_42013POC详情
60Nonehttps://github.com/qwutony/CVE-2021-41773POC详情
61Nonehttps://github.com/LayarKacaSiber/CVE-2021-41773POC详情
62Nonehttps://github.com/BabyTeam1024/CVE-2021-41773POC详情
63cve-2021-41773.py is a python script that will help in finding Path Traversal or Remote Code Execution vulnerability in Apache 2.4.49https://github.com/walnutsecurity/cve-2021-41773POC详情
64Poc CVE-2021-41773 - Apache 2.4.49 with CGI enabledhttps://github.com/TheLastVvV/CVE-2021-41773POC详情
65Nonehttps://github.com/MazX0p/CVE-2021-41773POC详情
66A automatic scanner to apache 2.4.49https://github.com/vida003/Scanner-CVE-2021-41773POC详情
67Remote Code Execution exploit for Apache servers. Affected versions: Apache 2.4.49, Apache 2.4.50https://github.com/mr-exo/CVE-2021-41773POC详情
68Setup vulnerable enviornmenthttps://github.com/wolf1892/CVE-2021-41773POC详情
69Some docker images to play with CVE-2021-41773 and CVE-2021-42013https://github.com/Hydragyrum/CVE-2021-41773-PlaygroundPOC详情
70This Metasploit module exploits an unauthenticated remote code execution vulnerability which exists in Apache version 2.4.49 (CVE-2021-41773). If files outside of the document root are not protected by ‘require all denied’ and CGI has been explicitly enabled, it can be used to execute arbitrary commands. This vulnerability has been reintroduced in the Apache 2.4.50 fix (CVE-2021-42013).https://github.com/IcmpOff/Apache-2.4.49-2.4.50-Traversal-Remote-Code-Execution-ExploitPOC详情
71Ce programme permet de détecter une faille RCE sur les serveurs Apache 2.4.49 et Apache 2.4.50https://github.com/pirenga/CVE-2021-41773POC详情
72Nonehttps://github.com/kubota/POC-CVE-2021-41773POC详情
73Nonehttps://github.com/xMohamed0/CVE-2021-41773POC详情
74Nonehttps://github.com/i6c/MASS_CVE-2021-41773POC详情
75School project - Please use other repos for actual testinghttps://github.com/norrig/CVE-2021-41773-exploiterPOC详情
76A flaw was found in a change made to path normalization in Apache HTTP Server 2.4.49. An attacker could use a path traversal attack to map URLs to files outside the directories configured by Alias-like directives. If files outside of these directories are not protected by the usual default configuration "require all denied", these requests can succeed. If CGI scripts are also enabled for these aliased pathes, this could allow for remote code execution. This issue only affects Apache 2.4.49 and not earlier versions. Credits to: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-41773 https://github.com/m96dg/CVE-2021-41773-exercisePOC详情
77Nonehttps://github.com/skentagon/CVE-2021-41773POC详情
78These Metasploit, Nmap, Python and Ruby scripts detects and exploits CVE-2021-41773 with RCE and local file disclosure.https://github.com/mauricelambert/CVE-2021-41773POC详情
79Small PoC of CVE-2021-41773https://github.com/the29a/CVE-2021-41773POC详情
80Apache2 2.4.49 - LFI & RCE Exploit - CVE-2021-41773https://github.com/thehackersbrain/CVE-2021-41773POC详情
81Nonehttps://github.com/honypot/CVE-2021-41773POC详情
82Nonehttps://github.com/Fa1c0n35/CVE-2021-41773POC详情
83Nonehttps://github.com/puckiestyle/CVE-2021-41773POC详情
84Nonehttps://github.com/zer0qs/CVE-2021-41773POC详情
85Nonehttps://github.com/DoTuan1/Reserch-CVE-2021-41773POC详情
86Environment for CVE-2021-41773 recreation.https://github.com/bernardas/netsec-polygonPOC详情
87CVE-2021-41773 | CVE-2021-42013 Exploit Tool (Apache/2.4.49-2.4.50)https://github.com/CalfCrusher/Path-traversal-RCE-Apache-2.4.49-2.4.50-ExploitPOC详情
88Nonehttps://github.com/vuongnv3389-sec/cve-2021-41773POC详情
89Nonehttps://github.com/Chocapikk/CVE-2021-41773POC详情
90CVE-2021-41773&CVE-2021-42013图形化漏洞检测利用工具https://github.com/wangfly-me/Apache_Penetration_ToolPOC详情
91CVE-2021-41773 Shodan scannerhttps://github.com/anldori/CVE-2021-41773-ScannerPOC详情
92Essay (and PoCs) about CVE-2021-41773, a remote code execution vulnerability in Apache 2.4.49 🕸️https://github.com/iosifache/ApacheRCEEssayPOC详情
93CVE-2021-41773 | Apache HTTP Server 2.4.49 is vulnerable to Path Traversal and Remote Code execution attacks https://github.com/Habib0x0/CVE-2021-41773POC详情
94A flaw was found in a change made to path normalization in Apache HTTP Server 2.4.49. An attacker could use a path traversal attack to map URLs to files outside the directories configured by Alias-like directives. If files outside of these directories are not protected by the usual default configuration "require all denied", these requests can succeed. If CGI scripts are also enabled for these aliased pathes, this could allow for remote code execution. This issue is known to be exploited in the wild. This issue only affects Apache 2.4.49 and not earlier versions. The fix in Apache HTTP Server 2.4.50 was found to be incomplete, see CVE-2021-42013.https://github.com/pwn3z/CVE-2021-41773-Apache-RCEPOC详情
95Mitigation/fix of CVE-2021-41773 A Path Traversal And File Disclosure Vulnerability In Apachehttps://github.com/EkamSinghWalia/Mitigation-Apache-CVE-2021-41773-POC详情
96CVE-2021-41773 Gaurav Raj's exploit modified by Plunderhttps://github.com/Plunder283/CVE-2021-41773POC详情
97Nonehttps://github.com/mightysai1997/cve-2021-41773POC详情
98Nonehttps://github.com/mightysai1997/CVE-2021-41773hPOC详情
99Nonehttps://github.com/mightysai1997/cve-2021-41773-v-POC详情
100Nonehttps://github.com/mightysai1997/CVE-2021-41773-i-POC详情
101Nonehttps://github.com/mightysai1997/CVE-2021-41773-L-POC详情
102Nonehttps://github.com/mightysai1997/CVE-2021-41773-PoCPOC详情
103Nonehttps://github.com/mightysai1997/CVE-2021-41773.git1POC详情
104Nonehttps://github.com/mightysai1997/CVE-2021-41773mPOC详情
105Nonehttps://github.com/mightysai1997/CVE-2021-41773SPOC详情
106Nonehttps://github.com/dileepdkumar/LayarKacaSiber-CVE-2021-41773POC详情
107apache路径穿越漏洞poc&exphttps://github.com/aqiao-jashell/CVE-2021-41773POC详情
108python编写的apache路径穿越poc&exphttps://github.com/aqiao-jashell/py-CVE-2021-41773POC详情
109Vulnerable configuration Apache HTTP Server version 2.4.49https://github.com/12345qwert123456/CVE-2021-41773POC详情
110Apache HTTP-Server 2.4.49-2.4.50 Path Traversal & Remote Code Execution PoC (CVE-2021-41773 & CVE-2021-42013)https://github.com/blackn0te/Apache-HTTP-Server-2.4.49-2.4.50-Path-Traversal-Remote-Code-ExecutionPOC详情
111Exploit for path transversal vulnerability in apachehttps://github.com/TheKernelPanic/exploit-apache2-cve-2021-41773POC详情
112CVE-2021-41773 vulnerable apache version 2.4.49 lab set-up.https://github.com/retrymp3/apache2.4.49VulnerableLabSetupPOC详情
113A little demonstration of cve-2021-41773 on httpd docker containershttps://github.com/MatanelGordon/docker-cve-2021-41773POC详情
114Exploit created in python3 to exploit known vulnerabilities in Apache web server (CVE-2021-41773, CVE-2021-42013)https://github.com/0xGabe/Apache-CVEsPOC详情
115Exploit CVE-2021-41773 and CVE-2021-42013https://github.com/OfriOuzan/CVE-2021-41773_CVE-2021-42013_ExploitsPOC详情
116Simple Metasploit-Framework module for conducting website penetration tests (CVE-2021-41773).https://github.com/belajarqywok/CVE-2021-41773-MSFPOC详情
117Nonehttps://github.com/Iris288/CVE-2021-41773POC详情
118Nonehttps://github.com/ilurer/CVE-2021-41773-42013POC详情
119CVE-2021-41773, CVE-2021-42013https://github.com/OpenCVEs/CVE-2021-41773POC详情
120CVE-2021-41773.pyhttps://github.com/Maybe4a6f7365/CVE-2021-41773POC详情
121Nonehttps://github.com/5l1v3r1/CVE-2021-41773-42013POC详情
122POC & Lab For CVE-2021-41773https://github.com/0xc4t/CVE-2021-41773POC详情
123Apache-HTTP-Server-2.4.50-RCE This tool is designed to test Apache servers for the CVE-2021-41773 / CVE-2021-42013 vulnerability. It is intended for educational purposes only and should be used responsibly on systems you have explicit permission to test.https://github.com/Zyx2440/Apache-HTTP-Server-2.4.50-RCEPOC详情
124Apache: a Mainstream Web Service Turned a Vector of Attack for Remote Code Executionhttps://github.com/jkska23/Additive-Vulnerability-Analysis-CVE-2021-41773POC详情
125This document provides step-by-step instructions on performing a proof of concept (PoC) exploit on Apache HTTP Server 2.4.29, taking advantage of the path traversal vulnerability (CVE-2021-41773) and the globally accessible /tmp folder on Linux and MITIGATIONhttps://github.com/nwclasantha/Apache_2.4.29_ExploitPOC详情
126Nonehttps://github.com/redspy-sec/CVE-2021-41773POC详情
127MASS CVE-2021-41773https://github.com/FakesiteSecurity/CVE-2021-41773POC详情
128Nonehttps://github.com/Taldrid1/cve-2021-41773POC详情
129This repository contains a Proof-of-Concept for the CVE-2021-41773. This CVE contains a LFI and RCE vulnerablity.https://github.com/tiemio/SSH-key-and-RCE-PoC-for-CVE-2021-41773POC详情
130 Apache HTTP Server 2.4.49, 2.4.50 - Path Traversal & RCEhttps://github.com/ch4os443/CVE-2021-41773POC详情
131In this project, I documented a detailed penetration testing process targeting Apache HTTP Server vulnerabilities, specifically CVE-2021-41773 and CVE-2021-42013, which involve Path Traversal and Remote Code Execution (RCE).https://github.com/Vanshuk-Bhagat/Apache-HTTP-Server-Vulnerabilities-CVE-2021-41773-and-CVE-2021-42013POC详情
132CVE-2021-41773 https://github.com/javaamo/CVE-2021-41773POC详情
133The POC and Lab setup documentation of CVE 2021 41773 https://github.com/ashique-thaha/CVE-2021-41773-POCPOC详情
134On the 11/11/21 the apache 2.4.49-2.4.50 remote command execution POC has been published online and this is a loader so that you can mass exploit servers using this.https://github.com/Soliux/CVE-2021-41773POC详情
135Nonehttps://github.com/luongchivi/CVE-2021-41773POC详情
136Nonehttps://github.com/luongchivi/Preproduce-CVE-2021-41773POC详情
137A flaw was found in a change made to path normalization in Apache HTTP Server 2.4.49. An attacker could use a path traversal attack to map URLs to files outside the expected document root. If files outside of the document root are not protected by "require all denied" these requests can succeed. Additionally, this flaw could leak the source of interpreted files like CGI scripts. This issue is known to be exploited in the wild. This issue only affects Apache 2.4.49 and not earlier versions. https://github.com/projectdiscovery/nuclei-templates/blob/main/http/cves/2021/CVE-2021-41773.yamlPOC详情
138Nonehttps://github.com/Threekiii/Awesome-POC/blob/master/%E4%B8%AD%E9%97%B4%E4%BB%B6%E6%BC%8F%E6%B4%9E/Apache%20HTTPd%20%E8%B7%AF%E5%BE%84%E7%A9%BF%E8%B6%8A%E6%BC%8F%E6%B4%9E%20CVE-2021-41773.mdPOC详情
139Nonehttps://github.com/Threekiii/Awesome-POC/blob/master/%E4%B8%AD%E9%97%B4%E4%BB%B6%E6%BC%8F%E6%B4%9E/Apache%20HTTP%20Server%202.4.49%20%E8%B7%AF%E5%BE%84%E7%A9%BF%E8%B6%8A%E6%BC%8F%E6%B4%9E%20CVE-2021-41773.mdPOC详情
140Nonehttps://github.com/chaitin/xray-plugins/blob/main/poc/manual/apache-httpd-cve-2021-41773-rce.ymlPOC详情
141https://github.com/vulhub/vulhub/blob/master/httpd/CVE-2021-41773/README.mdPOC详情
142Kiểm thử xâm nhập https://github.com/khaidtraivch/CVE-2021-41773-Apache-2.4.49-POC详情
143Apache 2.4.49 Exploithttps://github.com/RizqiSec/CVE-2021-41773POC详情
144Nonehttps://github.com/Ask-os/CVE-2021-41773POC详情
145Nonehttps://github.com/CyberQuestor-infosec/CVE-2021-41773-Apache_2.4.49-Path-traversal-to-RCEPOC详情
146 Detects Apache HTTP Server path traversal vulnerabilities (CVE-2021-41773, CVE-2021-42013) by checking for exposure of /etc/passwd through various traversal techniques.https://github.com/psibot/apache-vulnerablePOC详情
147Python exploit for CVE-2021-41773 - Apache HTTP Server 2.4.49 Path Traversal vulnerabilityhttps://github.com/blu3ming/PoC-CVE-2021-41773POC详情
148Nonehttps://github.com/r0otk3r/CVE-2021-41773POC详情
149Nonehttps://github.com/AzK-os-dev/CVE-2021-41773POC详情
150Nonehttps://github.com/rajaabdullahnasir/CVE-2021-41773_exploitationPOC详情
151Nonehttps://github.com/JIYUN02/cve-2021-41773POC详情
152Bash POC script for RCE vulnerability in Apache 2.4.49https://github.com/mah4nzfr/CVE-2021-41773POC详情
153Nonehttps://github.com/charanvoonna/CVE-2021-41773POC详情
154Docker container lab to play/learn with CVE-2021-41773https://github.com/twseptian/cve-2021-41773-docker-labPOC详情
155CTF_WRITEUPS/TryHackMe /CVE-2021-41773/https://github.com/hackedrishi/CTF_WRITEUPS-TryHackMe-CVE-2021-41773-POC详情
156Documented CVE-2021-41773 (Apache HTTP Server path traversal, CVSS 9.8) — produced CVSS breakdown, impact assessment, and a mitigation plan (patch to 2.4.51+, CGI disable, firewall) and published the analysis on GitHub.https://github.com/MuhammadHuzaifaAsif/security-labPOC详情
157Remote Code Execution PoC for Apache 2.4.49https://github.com/gunzf0x/CVE-2021-41773POC详情
158Nonehttps://github.com/AzkOsDev/CVE-2021-41773POC详情
159Nonehttps://github.com/Mahfujurjust/CVE-2021-41773POC详情
160Nonehttps://github.com/adrianmafandy/CVE-2021-41773POC详情
161Path Traversal Apache HTTP Server 2.4.49/2.4.50https://github.com/faizdotid/CVE-2021-41773POC详情
三、漏洞 CVE-2021-41773 的情报信息
四、漏洞 CVE-2021-41773 的评论

暂无评论


发表评论