目标达成 感谢每一位支持者 — 我们达成了 100% 目标!

目标: 1000 元 · 已筹: 1000

100.0%

CVE-2021-42013 PoC — Apache HTTP Server 安全漏洞

来源
关联漏洞
标题:Apache HTTP Server 安全漏洞 (CVE-2021-42013)
Description:Apache HTTP Server是美国阿帕奇(Apache)基金会的一款开源网页服务器。该服务器具有快速、可靠且可通过简单的API进行扩充的特点。 Apache HTTP Server 存在安全漏洞,该漏洞源于发现 Apache HTTP Server 2.4.50 版本中对 CVE-2021-41773 的修复不够充分。攻击者可以使用路径遍历攻击将 URL 映射到由类似别名的指令配置的目录之外的文件。如果这些目录之外的文件不受通常的默认配置“要求全部拒绝”的保护,则这些请求可能会成功。如果还为这些别
Description
CVE-2021-42013 Vulnerability Scanner  This Python script checks for the Remote Code Execution (RCE) vulnerability (CVE-2021-42013) in Apache 2.4.50. 
介绍
# CVE-2021-42013 Vulnerability Scanner

This Python script checks for the Remote Code Execution (RCE) vulnerability (CVE-2021-42013) in Apache 2.4.50.

## Introduction

This script is designed to help identify if a server is vulnerable to the CVE-2021-42013 RCE vulnerability in Apache 2.4.50. It checks the server's response headers to determine if the vulnerability exists and exploits it for educational purposes.

## Prerequisites

- Python 3.x (Written on Python3.12)
- Internet connectivity

## Usage

1. Clone the repository or download the `cve-2021-42013.py` script.
2. Run the script using Python:

    ```bash
    python cve-2021-42013.py -u <URL>
    ```

    Replace `<URL>` with the URL of the server you want to scan.

3. Follow the prompts to enter a command to execute on the vulnerable server.
4. Review the script's output for results.

![CVE-2021-42013_DEMO](https://github.com/BassoNicolas/CVE-2021-42013/assets/70383324/12bc62b6-04b7-4a4e-be23-3a156104dfbb)

## Options

- `-u, --url`: Specify the URL of the server to scan for the CVE-2021-42013 vulnerability.

## Disclaimer

This script is provided for educational and research purposes only. Use it responsibly and do not use it on servers without proper authorization.

## License

lol

## Contributions

Contributions are welcome! If you meet any issue regarding the script, you can either contact me on LinkedIn or open an issue :)
文件快照

[4.0K] /data/pocs/54dccd17142bcf73313016fac471162c41d4334c ├── [5.3K] CVE-2021-42013.py └── [1.4K] README.md 0 directories, 2 files
神龙机器人已为您缓存
备注
    1. 建议优先通过来源进行访问。
    2. 本地 POC 快照面向订阅用户开放;当原始来源失效或无法访问时,本地镜像作为订阅权益的一部分提供。
    3. 持续抓取、验证、维护这份 POC 档案需要不少投入,因此本地快照已纳入付费订阅。您的订阅是让这份资料能继续走下去的关键,由衷感谢。 查看订阅方案 →