关联漏洞
介绍
# CVE-2021-41773
[](https://travis-ci.org/joemccann/dillinger)
I have developed a POC of CVE-2021-41773 , RCE + cgi-bin path traversal
# NOTE :
TESTED ON APACHE2 2.4.49
You can pulled vuln Apache2 2.4.49 directly from Docker
```sh
$ sudo docker pull blueteamsteve/cve-2021-41773:no-cgid
$ sudo docker run -dit -p 80:80 blueteamsteve/cve-2021-41773:no-cgid
```
http://localhost:80
# path traversal

# RCE

# Requirement
- gnome-terminal
TO Download it:
- sudo apt-get install gnome-terminal
### USAGE
```sh
$ git clone https://github.com/MazX0p/CVE-2021-41773.git
$ cd CVE-2021-41773
$ bash CVE-2021-41773.sh
```
| Name | README |
| ------ | ------ |
| CVE | [CVE][PlGh] |
| ME! | [Linkedin][PlGc] |
License
----
MIT
**Free Software, Hell Yeah!**
[PlGh]: <https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-41773>
[PlGc]: <https://www.linkedin.com/in/0xmaz/>
文件快照
[4.0K] /data/pocs/50490dea7b4153ae34c532d0a0f3e403ad770198
├── [4.2K] CVE-2021-41773.sh
└── [1.2K] README.md
0 directories, 2 files
备注
1. 建议优先通过来源进行访问。
2. 如果因为来源失效或无法访问,请发送邮箱到 f.jinxu#gmail.com 索取本地快照(把 # 换成 @)。
3. 神龙已为您对POC代码进行快照,为了长期维护,请考虑为本地POC付费,感谢您的支持。