Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2021-26690— mod_session NULL pointer dereference

EPSS 67.42% · P99
Get alerts for future matching vulnerabilitiesLog in to subscribe

I. Basic Information for CVE-2021-26690

Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
mod_session NULL pointer dereference
Source: NVD (National Vulnerability Database)
Vulnerability Description
Apache HTTP Server versions 2.4.0 to 2.4.46 A specially crafted Cookie header handled by mod_session can cause a NULL pointer dereference and crash, leading to a possible Denial Of Service
Source: NVD (National Vulnerability Database)
CVSS Information
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Type
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Title
Apache HTTP Server 代码问题漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
Apache HTTP Server是美国阿帕奇(Apache)基金会的一款开源网页服务器。该服务器具有快速、可靠且可通过简单的API进行扩充的特点。 Apache HTTP Server 存在代码问题漏洞,该漏洞源于在mod会话中一个NULL指针解引用错误。远程攻击者可利用该漏洞将专门设计的数据传递给应用程序,并执行拒绝服务(DoS)攻击。以下产品及版本受到影响:EasyApache: 4 2017-5-16, 4 2017-6-13, 4 2017-6-21, 4 2017-7-11, 4 2017-
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)

Shenlong Deep Dive — AI Deep Analysis

10-question deep dive: root cause, exploitation, mitigation, urgency. Read summary free, full version requires login.

Affected Products

VendorProductAffected VersionsCPESubscribe
Apache Software FoundationApache HTTP Server 2.4.46 -

II. Public POCs for CVE-2021-26690

#POC DescriptionSource LinkShenlong Link
1Nonehttps://github.com/dja2TaqkGEEfA45/CVE-2021-26690POC Details
2CVE-2021-26690 patch diffing - Apache HTTP mod_session NULL pointer dereferencehttps://github.com/7own/CVE-2021-26690---Apache-mod_sessionPOC Details
3CVE-2021-26690 - Null Pointer Dereference leads to Denial of Service attack on Apache HTTP Server versions 2.4.0 to 2.4.46https://github.com/0xdeviner/CVE-2021-26690POC Details
4Nonehttps://github.com/danielduan2002/CVE-2021-26690POC Details
AI-Generated POCPremium

No public POC found.

Login to generate AI POC

III. Intelligence Information for CVE-2021-26690

登录查看更多情报信息。

Same Patch Batch · Apache Software Foundation · 2021-06-10 · 7 CVEs total

CVE-2021-30641Unexpected URL matching with 'MergeSlashes OFF'
CVE-2021-26691Apache HTTP Server mod_session response handling heap overflow
CVE-2020-13950mod_proxy_http NULL pointer dereference
CVE-2020-35452mod_auth_digest possible stack overflow by one nul byte
CVE-2020-13938Improper Handling of Insufficient Privileges
CVE-2019-17567mod_proxy_wstunnel tunneling of non Upgraded connections

IV. Related Vulnerabilities

V. Comments for CVE-2021-26690

No comments yet


Leave a comment