关联漏洞
介绍
# Apache Path Traversal & RCE Exploit
**CVE-2021-41773 & CVE-2021-42013**
These are critical path traversal vulnerabilities affecting **Apache HTTP Server 2.4.49** and **2.4.50**.
They allow attackers to:
- Access files outside the web root (LFI)
- Achieve Remote Code Execution (RCE) if CGI is enabled
Both vulnerabilities are **patched in Apache 2.4.51**.
**Immediate upgrading is strongly recommended.**
---
## Usage
```bash
python3 exploit.py --url <TARGET> --port [PORT] (--rce --command "COMMAND" | --lfi --path "/path/to/file")
```
Examples
- Remote Code Execution:
````bash
python3 exploit.py --url http://192.168.1.10 --rce --command "id"
````

- Local File Inclusion:
```bash
python3 exploit.py --url http://192.168.1.10 --lfi --path "/etc/passwd"
````

---
## ⚠️ Disclaimer
This exploit script is for authorized security testing, defensive research, and educational purposes only.
---
## Official Channels
- [YouTube @rootctf](https://www.youtube.com/@rootctf)
- [X @r0otk3r](https://x.com/r0otk3r)
文件快照
[4.0K] /data/pocs/3a97e6f2026a11127c900fc34184278a71cb619d
├── [5.2K] exploit.py
└── [1.2K] README.md
0 directories, 2 files
备注
1. 建议优先通过来源进行访问。
2. 如果因为来源失效或无法访问,请发送邮箱到 f.jinxu#gmail.com 索取本地快照(把 # 换成 @)。
3. 神龙已为您对POC代码进行快照,为了长期维护,请考虑为本地POC付费,感谢您的支持。