Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.
10-question deep dive: root cause, exploitation, mitigation, urgency. Read summary free, full version requires login.
| Vendor | Product | Affected Versions | CPE | Subscribe |
|---|---|---|---|---|
| Apache Software Foundation | Apache HTTP Server | Apache HTTP Server 2.4 ~ 2.4.48 | - |
| # | POC Description | Source Link | Shenlong Link |
|---|---|---|---|
| 1 | None | https://github.com/xiaojiangxl/CVE-2021-40438 | POC Details |
| 2 | CVE-2021-40438 exploit PoC with Docker setup. | https://github.com/sixpacksecurity/CVE-2021-40438 | POC Details |
| 3 | None | https://github.com/BabyTeam1024/CVE-2021-40438 | POC Details |
| 4 | Dockerized Proof-of-Concept of CVE-2021-40438 in Apache 2.4.48. | https://github.com/ericmann/apache-cve-poc | POC Details |
| 5 | Sigma-Rule-for-CVE-2021-40438-Attack-Attemp | https://github.com/pisut4152/Sigma-Rule-for-CVE-2021-40438-exploitation-attempt | POC Details |
| 6 | Apache forward request CVE | https://github.com/Kashkovsky/CVE-2021-40438 | POC Details |
| 7 | check CVE-2021-40438 | https://github.com/gassara-kys/CVE-2021-40438 | POC Details |
| 8 | CVE-2021-40438 Apache <= 2.4.48 SSRF exploit | https://github.com/sergiovks/CVE-2021-40438-Apache-2.4.48-SSRF-exploit | POC Details |
| 9 | Apache <= 2.4.48 Mod_Proxy - Server-Side Request Forgery | https://github.com/Cappricio-Securities/CVE-2021-40438 | POC Details |
| 10 | Check Point Security Gateways RCE via CVE-2021-40438 | https://github.com/element-security/check-point-gateways-rce | POC Details |
| 11 | Check Point Security Gateways RCE via CVE-2021-40438 | https://github.com/yakir2b/check-point-gateways-rce | POC Details |
| 12 | Apache 2.4.48 and below contain an issue where uri-path can cause mod_proxy to forward the request to an origin server chosen by the remote user. | https://github.com/projectdiscovery/nuclei-templates/blob/main/http/cves/2021/CVE-2021-40438.yaml | POC Details |
| 13 | None | https://github.com/Threekiii/Awesome-POC/blob/master/%E4%B8%AD%E9%97%B4%E4%BB%B6%E6%BC%8F%E6%B4%9E/Apache%20HTTP%20Server%202.4.48%20mod_proxy%20SSRF%E6%BC%8F%E6%B4%9E%20CVE-2021-40438.md | POC Details |
| 14 | None | https://github.com/chaitin/xray-plugins/blob/main/poc/manual/apache-httpd-cve-2021-40438-ssrf.yml | POC Details |
| 15 | https://github.com/vulhub/vulhub/blob/master/httpd/CVE-2021-40438/README.md | POC Details | |
| 16 | None | https://github.com/n0m-d/CVE-2021-40438-POC | POC Details |
No public POC found.
Login to generate AI POC| CVE-2021-41079 | Apache Tomcat DoS with unexpected TLS packet | |
| CVE-2021-39275 | ap_escape_quotes buffer overflow | |
| CVE-2021-39239 | XML External Entity (XXE) vulnerability | |
| CVE-2021-36160 | mod_proxy_uwsgi out of bound read | |
| CVE-2021-34798 | NULL pointer dereference in httpd core |
No comments yet