高度な大規模言語モデル技術を使用していますが、出力には不正確または古い情報が含まれる可能性があります。Shenlongはデータの正確性を確保するよう努めていますが、実際の状況に基づいて検証・判断してください。
| ベンダー | プロダクト | 影響を受けるバージョン | CPE | 購読 |
|---|---|---|---|---|
| Apache Software Foundation | Apache HTTP Server | Apache HTTP Server 2.4 ~ 2.4.48 | - |
| # | POC説明 | ソースリンク | Shenlongリンク |
|---|---|---|---|
| 1 | None | https://github.com/xiaojiangxl/CVE-2021-40438 | POC詳細 |
| 2 | CVE-2021-40438 exploit PoC with Docker setup. | https://github.com/sixpacksecurity/CVE-2021-40438 | POC詳細 |
| 3 | None | https://github.com/BabyTeam1024/CVE-2021-40438 | POC詳細 |
| 4 | Dockerized Proof-of-Concept of CVE-2021-40438 in Apache 2.4.48. | https://github.com/ericmann/apache-cve-poc | POC詳細 |
| 5 | Sigma-Rule-for-CVE-2021-40438-Attack-Attemp | https://github.com/pisut4152/Sigma-Rule-for-CVE-2021-40438-exploitation-attempt | POC詳細 |
| 6 | Apache forward request CVE | https://github.com/Kashkovsky/CVE-2021-40438 | POC詳細 |
| 7 | check CVE-2021-40438 | https://github.com/gassara-kys/CVE-2021-40438 | POC詳細 |
| 8 | CVE-2021-40438 Apache <= 2.4.48 SSRF exploit | https://github.com/sergiovks/CVE-2021-40438-Apache-2.4.48-SSRF-exploit | POC詳細 |
| 9 | Apache <= 2.4.48 Mod_Proxy - Server-Side Request Forgery | https://github.com/Cappricio-Securities/CVE-2021-40438 | POC詳細 |
| 10 | Check Point Security Gateways RCE via CVE-2021-40438 | https://github.com/element-security/check-point-gateways-rce | POC詳細 |
| 11 | Check Point Security Gateways RCE via CVE-2021-40438 | https://github.com/yakir2b/check-point-gateways-rce | POC詳細 |
| 12 | Apache 2.4.48 and below contain an issue where uri-path can cause mod_proxy to forward the request to an origin server chosen by the remote user. | https://github.com/projectdiscovery/nuclei-templates/blob/main/http/cves/2021/CVE-2021-40438.yaml | POC詳細 |
| 13 | None | https://github.com/Threekiii/Awesome-POC/blob/master/%E4%B8%AD%E9%97%B4%E4%BB%B6%E6%BC%8F%E6%B4%9E/Apache%20HTTP%20Server%202.4.48%20mod_proxy%20SSRF%E6%BC%8F%E6%B4%9E%20CVE-2021-40438.md | POC詳細 |
| 14 | None | https://github.com/chaitin/xray-plugins/blob/main/poc/manual/apache-httpd-cve-2021-40438-ssrf.yml | POC詳細 |
| 15 | https://github.com/vulhub/vulhub/blob/master/httpd/CVE-2021-40438/README.md | POC詳細 | |
| 16 | None | https://github.com/n0m-d/CVE-2021-40438-POC | POC詳細 |
公開POCは見つかりませんでした。
ログインしてAI POCを生成| CVE-2021-41079 | Apache Tomcat DoS with unexpected TLS packet | |
| CVE-2021-39275 | ap_escape_quotes buffer overflow | |
| CVE-2021-39239 | XML External Entity (XXE) vulnerability | |
| CVE-2021-36160 | mod_proxy_uwsgi out of bound read | |
| CVE-2021-34798 | NULL pointer dereference in httpd core |
まだコメントはありません