Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2011-3368 PoC — Apache HTTP Server多个模式输入验证错误漏洞

Source
Associated Vulnerability
Title:Apache HTTP Server多个模式输入验证错误漏洞 (CVE-2011-3368)
Description:Apache HTTP Server是美国阿帕奇(Apache)软件基金会的一款开源网页服务器。该服务器具有快速、可靠且可通过简单的API进行扩充的特点。 Apache HTTP Server 1.3.x到1.3.42, 2.0.x到 2.0.64,2.2.x到2.2.21版本中mod_proxy模块存在用(1) RewriteRule和(2) ProxyPassMatch模式匹配反转代理不能正确交互的漏洞。远程攻击者可借助起点包含@字符的畸形URL对内联网服务器发送请求。
Description
PoC Scan. (cve-2011-3368)
Readme
# CVE-2011-3368

PoC Exploit. (cve-2011-3368)

# Install:

git clone https://github.com/colorblindpentester/CVE-2011-3368

cd CVE-2011-3368

python2 CVE-2011-3368.py

# Tested on:

OS X (macos)

Parrot OS 

Kali linux
File Snapshot

[4.0K] /data/pocs/e3c5949627069bfded1eabd54096f3dd277bc9aa ├── [3.9K] CVE-2011-3368_poc.py └── [ 218] README.md 0 directories, 2 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. If the original source is unavailable, please email f.jinxu#gmail.com for a local snapshot (replace # with @).
    3. Shenlong has snapshotted the POC code for you. To support long-term maintenance, please consider donating. Thank you for your support.