POC详情: 54dccd17142bcf73313016fac471162c41d4334c

来源
关联漏洞
标题: Apache HTTP Server 安全漏洞 (CVE-2021-42013)
描述:Apache HTTP Server是美国阿帕奇(Apache)基金会的一款开源网页服务器。该服务器具有快速、可靠且可通过简单的API进行扩充的特点。 Apache HTTP Server 存在安全漏洞,该漏洞源于发现 Apache HTTP Server 2.4.50 版本中对 CVE-2021-41773 的修复不够充分。攻击者可以使用路径遍历攻击将 URL 映射到由类似别名的指令配置的目录之外的文件。如果这些目录之外的文件不受通常的默认配置“要求全部拒绝”的保护,则这些请求可能会成功。如果还为这些别
描述
CVE-2021-42013 Vulnerability Scanner  This Python script checks for the Remote Code Execution (RCE) vulnerability (CVE-2021-42013) in Apache 2.4.50. 
介绍
# CVE-2021-42013 Vulnerability Scanner

This Python script checks for the Remote Code Execution (RCE) vulnerability (CVE-2021-42013) in Apache 2.4.50.

## Introduction

This script is designed to help identify if a server is vulnerable to the CVE-2021-42013 RCE vulnerability in Apache 2.4.50. It checks the server's response headers to determine if the vulnerability exists and exploits it for educational purposes.

## Prerequisites

- Python 3.x (Written on Python3.12)
- Internet connectivity

## Usage

1. Clone the repository or download the `cve-2021-42013.py` script.
2. Run the script using Python:

    ```bash
    python cve-2021-42013.py -u <URL>
    ```

    Replace `<URL>` with the URL of the server you want to scan.

3. Follow the prompts to enter a command to execute on the vulnerable server.
4. Review the script's output for results.

![CVE-2021-42013_DEMO](https://github.com/BassoNicolas/CVE-2021-42013/assets/70383324/12bc62b6-04b7-4a4e-be23-3a156104dfbb)

## Options

- `-u, --url`: Specify the URL of the server to scan for the CVE-2021-42013 vulnerability.

## Disclaimer

This script is provided for educational and research purposes only. Use it responsibly and do not use it on servers without proper authorization.

## License

lol

## Contributions

Contributions are welcome! If you meet any issue regarding the script, you can either contact me on LinkedIn or open an issue :)
文件快照

[4.0K] /data/pocs/54dccd17142bcf73313016fac471162c41d4334c ├── [5.3K] CVE-2021-42013.py └── [1.4K] README.md 0 directories, 2 files
神龙机器人已为您缓存
备注
    1. 建议优先通过来源进行访问。
    2. 如果因为来源失效或无法访问,请发送邮箱到 f.jinxu#gmail.com 索取本地快照(把 # 换成 @)。
    3. 神龙已为您对POC代码进行快照,为了长期维护,请考虑为本地POC付费,感谢您的支持。