支持本站 — 捐款将帮助我们持续运营

目标: 1000 元,已筹: 1000

100.0%

POC详情: 1c321608aa40402e6ea8c7ca16739a25acd07c06

来源
关联漏洞
标题:Apache HTTP Server 安全漏洞 (CVE-2023-38709)
Description:Apache HTTP Server是美国阿帕奇(Apache)基金会的一款开源网页服务器。该服务器具有快速、可靠且可通过简单的API进行扩充的特点。 Apache HTTP Server 2.4.58版本及之前版本存在安全漏洞,该漏洞源于输入验证不正确。
Description
Apache HTTP Server Vulnerability Testing Tool | PoC for CVE-2024-38472 , CVE-2024-39573 , CVE-2024-38477 , CVE-2024-38476 , CVE-2024-38475 , CVE-2024-38474 ,  CVE-2024-38473 , CVE-2023-38709
介绍
# Apache HTTP Server Vulnerability Testing Tool

This repository provides a **Proof of Concept (PoC)** for testing various vulnerabilities in the Apache HTTP Server, including Filename Confusion Attacks, SSRF, Denial of Service, and others related to recent CVEs. The tool sends crafted HTTP requests to assess whether the server is vulnerable to certain types of attacks.

## Features
- Tests for multiple vulnerabilities including:
  - **CVE-2024-38472**: Apache HTTP Server on Windows UNC SSRF
  - **CVE-2024-39573**: mod_rewrite proxy handler substitution
  - **CVE-2024-38477**: Crash resulting in Denial of Service in mod_proxy
  - **CVE-2024-38476**: Exploitable backend application output causing internal redirects
  - **CVE-2024-38475**: mod_rewrite weakness with filesystem path matching
  - **CVE-2024-38474**: Weakness with encoded question marks in backreferences
  - **CVE-2024-38473**: mod_proxy proxy encoding problem
  - **CVE-2023-38709**: HTTP response splitting
- Provides an easy-to-use command-line interface for testing various endpoints.

## How It Works
The tool performs HTTP requests to potential endpoints that might be vulnerable to confusion attacks or misconfigurations. It checks for specific patterns and encodings that could lead to unauthorized access or system failures.

### Testing Targets
The tool checks for vulnerabilities on the following paths:
- **php-info.php**
- **xmlrpc.php**
- **adminer.php**
- **bin/cron.php**
- **cache/index.tpl.php**
- **cgi-bin/redir.cgi**
- Others with encoded URLs for potential bypass.

## Getting Started

### Prerequisites
- **Python 3.x** installed on your system.
- **Requests** library for Python to send HTTP requests.

You can install the required Python library using:
```bash
pip install requests
```
## Installation
Clone this repository:
```bash
git clone https://github.com/mrmtwoj/apache-vulnerability-testing.git
cd apache-vulnerability-testing
```
### Usage
To use the tool, provide the target URL you want to test:
```bash
python3 poc_vulnerability_testing.py --target http://<target-ip>
```
### For example:
```bash
python3 poc_vulnerability_testing.py --target http://192.168.1.10
```
## Command-Line Arguments
- **target**: The URL of the Apache server to test (e.g., http://example.com).
- **info**: Display tool information, such as the developer name, version, and related CVEs.
- **about**: Display information about the tool and its purpose.


文件快照

[4.0K] /data/pocs/1c321608aa40402e6ea8c7ca16739a25acd07c06 ├── [3.2K] poc_vulnerability_testing.py └── [2.4K] README.md 0 directories, 2 files
神龙机器人已为您缓存
备注
    1. 建议优先通过来源进行访问。
    2. 如果因为来源失效或无法访问,请发送邮件到 f.jinxu#gmail.com 索取本地快照(把 # 换成 @)。
    3. 神龙已为您对 POC 代码进行快照,为了长期维护,请考虑为本地 POC 付费/捐赠,感谢您的支持。