Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2021-41773— Path traversal and file disclosure vulnerability in Apache HTTP Server 2.4.49

KEV · Ransomware EPSS 94.39% · P100
Get alerts for future matching vulnerabilitiesLog in to subscribe

I. Basic Information for CVE-2021-41773

Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
Path traversal and file disclosure vulnerability in Apache HTTP Server 2.4.49
Source: NVD (National Vulnerability Database)
Vulnerability Description
A flaw was found in a change made to path normalization in Apache HTTP Server 2.4.49. An attacker could use a path traversal attack to map URLs to files outside the directories configured by Alias-like directives. If files outside of these directories are not protected by the usual default configuration "require all denied", these requests can succeed. If CGI scripts are also enabled for these aliased pathes, this could allow for remote code execution. This issue is known to be exploited in the wild. This issue only affects Apache 2.4.49 and not earlier versions. The fix in Apache HTTP Server 2.4.50 was found to be incomplete, see CVE-2021-42013.
Source: NVD (National Vulnerability Database)
CVSS Information
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Type
对路径名的限制不恰当(路径遍历)
Source: NVD (National Vulnerability Database)
Vulnerability Title
Apache HTTP Server 路径遍历漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
Apache HTTP Server是美国阿帕奇(Apache)基金会的一款开源网页服务器。该服务器具有快速、可靠且可通过简单的API进行扩充的特点。 Apache HTTP Server 2.4.49版本存在路径遍历漏洞,攻击者可利用该漏洞使用路径遍历攻击将URL映射到预期文档根以外的文件。
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)

Shenlong Deep Dive — AI Deep Analysis

10-question deep dive: root cause, exploitation, mitigation, urgency. Read summary free, full version requires login.

Affected Products

VendorProductAffected VersionsCPESubscribe
Apache Software FoundationApache HTTP Server Apache HTTP Server 2.4 2.4.49 -

II. Public POCs for CVE-2021-41773

#POC DescriptionSource LinkShenlong Link
1CVE-2021-41773 Path Traversal vulnerability in Apache 2.4.49.https://github.com/Vulnmachines/cve-2021-41773POC Details
2CVE-2021-41773https://github.com/numanturle/CVE-2021-41773POC Details
3Path traversal in Apache HTTP Server 2.4.49 (CVE-2021-41773) https://github.com/knqyf263/CVE-2021-41773POC Details
4Nonehttps://github.com/ZephrFish/CVE-2021-41773-PoCPOC Details
5Nonehttps://github.com/iilegacyyii/PoC-CVE-2021-41773POC Details
6Nonehttps://github.com/masahiro331/CVE-2021-41773POC Details
7Exploitation of CVE-2021-41773 a Directory Traversal in Apache 2.4.49.https://github.com/j4k0m/CVE-2021-41773POC Details
8Poc.py https://github.com/TishcaTpx/POC-CVE-2021-41773POC Details
9Nonehttps://github.com/lorddemon/CVE-2021-41773-PoCPOC Details
10Apache HTTP Server 2.4.49, 2.4.50 - Path Traversal & RCEhttps://github.com/Ls4ss/CVE-2021-41773_CVE-2021-42013POC Details
11CVE-2021-41773 POC with Dockerhttps://github.com/itsecurityco/CVE-2021-41773POC Details
12PoC for CVE-2021-41773 with docker to demonstratehttps://github.com/habibiefaried/CVE-2021-41773-PoCPOC Details
13CVE-2021-41773https://github.com/creadpag/CVE-2021-41773-POCPOC Details
14CVE-2021-41773.nsehttps://github.com/TAI-REx/cve-2021-41773-nsePOC Details
15CVE-2021-41773 playgroundhttps://github.com/blasty/CVE-2021-41773POC Details
16Path Traversal vulnerability in Apache 2.4.49https://github.com/PentesterGuruji/CVE-2021-41773POC Details
17Path traversal and file disclosure vulnerability in Apache HTTP Server 2.4.49 (CVE-2021-41773)https://github.com/jbovet/CVE-2021-41773POC Details
18Nonehttps://github.com/mohwahyudi/cve-2021-41773POC Details
19CVE-2021-41773 的复现https://github.com/1nhann/CVE-2021-41773POC Details
20Nonehttps://github.com/ranggaggngntt/CVE-2021-41773POC Details
21Vulnerable docker images for CVE-2021-41773https://github.com/BlueTeamSteve/CVE-2021-41773POC Details
22Metasploit-Framework modules (scanner and exploit) for the CVE-2021-41773 and CVE-2021-42013 (Path Traversal in Apache 2.4.49/2.4.50)https://github.com/Zeop-CyberSec/apache_normalize_pathPOC Details
23Nonehttps://github.com/r00tVen0m/CVE-2021-41773POC Details
24exploit to CVE-2021-41773https://github.com/n3k00n3/CVE-2021-41773POC Details
25Nonehttps://github.com/fnatalucci/CVE-2021-41773-RCEPOC Details
26Apache 2.4.49https://github.com/AssassinUKG/CVE-2021-41773POC Details
27Simple script realizado en bash, para revisión de múltiples hosts para CVE-2021-41773 (Apache)https://github.com/jheeree/Simple-CVE-2021-41773-checkerPOC Details
28Apache HTTPd (2.4.49) – Local File Disclosure (LFI)https://github.com/orangmuda/CVE-2021-41773POC Details
29A framework for bug hunting or pentesting targeting websites that have CVE-2021-41773 Vulnerability in public https://github.com/HightechSec/scarce-apache2POC Details
30CVE-2021-41773, poc, exploithttps://github.com/vinhjaxt/CVE-2021-41773-exploitPOC Details
31CVE-2021-41773 exploit PoC with Docker setup.https://github.com/sixpacksecurity/CVE-2021-41773POC Details
32Nonehttps://github.com/Hattan515/POC-CVE-2021-41773POC Details
33CVE-2021-41773: Path Traversal Zero-Day in Apache HTTP Server Exploitedhttps://github.com/twseptian/cve-2021-41773POC Details
34CVE-2021-41773https://github.com/noflowpls/CVE-2021-41773POC Details
35Apache 2.4.49 Exploithttps://github.com/McSl0vv/CVE-2021-41773POC Details
36Nonehttps://github.com/shiomiyan/CVE-2021-41773POC Details
37MASS CVE-2021-41773https://github.com/justakazh/mass_cve-2021-41773POC Details
38Mass exploitation CVE-2021-41773 and auto detect possible RCEhttps://github.com/Sakura-nee/CVE-2021-41773POC Details
39This is a simple POC for Apache/2.4.49 Path Traversal Vulnerabilityhttps://github.com/shellreaper/CVE-2021-41773POC Details
40Exploit for Apache 2.4.49https://github.com/0xRar/CVE-2021-41773POC Details
41Nonehttps://github.com/pisut4152/Sigma-Rule-for-CVE-2021-41773-and-CVE-2021-42013-exploitation-attemptPOC Details
42A Zeek package which raises notices for Path Traversal/RCE in Apache HTTP Server 2.4.49 (CVE-2021-41773) and 2.4.50 (CVE-2021-42013)https://github.com/corelight/CVE-2021-41773POC Details
43Fast python tool to test apache path traversal CVE-2021-41773 in a List of url https://github.com/zeronine9/CVE-2021-41773POC Details
44A Python script to check if an Apache web server is vulnerable to CVE-2021-41773https://github.com/b1tsec/CVE-2021-41773POC Details
45POChttps://github.com/superzerosec/CVE-2021-41773POC Details
46Apache (Linux) CVE-2021-41773/2021-42013 Mass Vulnerability Checkerhttps://github.com/im-hanzou/apachrotPOC Details
47CVE-2021-41773 CVE-2021-42013漏洞批量检测工具https://github.com/inbug-team/CVE-2021-41773_CVE-2021-42013POC Details
48cve-2021-41773 即 cve-2021-42013 批量检测脚本https://github.com/5gstudent/cve-2021-41773-and-cve-2021-42013POC Details
49Apache 2.4.49 Path Traversal Vulnerability Checker https://github.com/EagleTube/CVE-2021-41773POC Details
50Nonehttps://github.com/cgddgc/CVE-2021-41773-42013POC Details
51CVE-2021-41773 Grabberhttps://github.com/apapedulimu/ApachukPOC Details
52 Apache HTTP Server 2.4.49, 2.4.50 - Path Traversal & RCEhttps://github.com/scarmandef/CVE-2021-41773POC Details
53Path Traversal and RCE in Apache HTTP Server 2.4.49 https://github.com/0xAlmighty/CVE-2021-41773-PoCPOC Details
54critical: Path Traversal and Remote Code Execution in Apache HTTP Server 2.4.49 and 2.4.50 (incomplete fix of CVE-2021-41773) (CVE-2021-42013)https://github.com/ksanchezcld/httpd-2.4.49POC Details
55Tool check: CVE-2021-41773, CVE-2021-42013, CVE-2020-17519https://github.com/MrCl0wnLab/SimplesApachePathTraversalPOC Details
56apache httpd path traversal checker(CVE-2021-41773 / CVE-2021-42013)https://github.com/theLSA/apache-httpd-path-traversal-checkerPOC Details
57The first vulnerability with the CVE identifier CVE-2021-41773 is a path traversal flaw that exists in Apache HTTP Server 2.4.49.https://github.com/LudovicPatho/CVE-2021-41773POC Details
58Simple honeypot for CVE-2021-41773 vulnerabilityhttps://github.com/lopqto/CVE-2021-41773_HoneypotPOC Details
59Lab setup for CVE-2021-41773 (Apache httpd 2.4.49) and CVE-2021-42013 (Apache httpd 2.4.50).https://github.com/zerodaywolf/CVE-2021-41773_42013POC Details
60Nonehttps://github.com/qwutony/CVE-2021-41773POC Details
61Nonehttps://github.com/LayarKacaSiber/CVE-2021-41773POC Details
62Nonehttps://github.com/BabyTeam1024/CVE-2021-41773POC Details
63cve-2021-41773.py is a python script that will help in finding Path Traversal or Remote Code Execution vulnerability in Apache 2.4.49https://github.com/walnutsecurity/cve-2021-41773POC Details
64Poc CVE-2021-41773 - Apache 2.4.49 with CGI enabledhttps://github.com/TheLastVvV/CVE-2021-41773POC Details
65Nonehttps://github.com/MazX0p/CVE-2021-41773POC Details
66A automatic scanner to apache 2.4.49https://github.com/vida003/Scanner-CVE-2021-41773POC Details
67Remote Code Execution exploit for Apache servers. Affected versions: Apache 2.4.49, Apache 2.4.50https://github.com/mr-exo/CVE-2021-41773POC Details
68Setup vulnerable enviornmenthttps://github.com/wolf1892/CVE-2021-41773POC Details
69Some docker images to play with CVE-2021-41773 and CVE-2021-42013https://github.com/Hydragyrum/CVE-2021-41773-PlaygroundPOC Details
70This Metasploit module exploits an unauthenticated remote code execution vulnerability which exists in Apache version 2.4.49 (CVE-2021-41773). If files outside of the document root are not protected by ‘require all denied’ and CGI has been explicitly enabled, it can be used to execute arbitrary commands. This vulnerability has been reintroduced in the Apache 2.4.50 fix (CVE-2021-42013).https://github.com/IcmpOff/Apache-2.4.49-2.4.50-Traversal-Remote-Code-Execution-ExploitPOC Details
71Ce programme permet de détecter une faille RCE sur les serveurs Apache 2.4.49 et Apache 2.4.50https://github.com/pirenga/CVE-2021-41773POC Details
72Nonehttps://github.com/kubota/POC-CVE-2021-41773POC Details
73Nonehttps://github.com/xMohamed0/CVE-2021-41773POC Details
74Nonehttps://github.com/i6c/MASS_CVE-2021-41773POC Details
75School project - Please use other repos for actual testinghttps://github.com/norrig/CVE-2021-41773-exploiterPOC Details
76A flaw was found in a change made to path normalization in Apache HTTP Server 2.4.49. An attacker could use a path traversal attack to map URLs to files outside the directories configured by Alias-like directives. If files outside of these directories are not protected by the usual default configuration "require all denied", these requests can succeed. If CGI scripts are also enabled for these aliased pathes, this could allow for remote code execution. This issue only affects Apache 2.4.49 and not earlier versions. Credits to: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-41773 https://github.com/m96dg/CVE-2021-41773-exercisePOC Details
77Nonehttps://github.com/skentagon/CVE-2021-41773POC Details
78These Metasploit, Nmap, Python and Ruby scripts detects and exploits CVE-2021-41773 with RCE and local file disclosure.https://github.com/mauricelambert/CVE-2021-41773POC Details
79Small PoC of CVE-2021-41773https://github.com/the29a/CVE-2021-41773POC Details
80Apache2 2.4.49 - LFI & RCE Exploit - CVE-2021-41773https://github.com/thehackersbrain/CVE-2021-41773POC Details
81Nonehttps://github.com/honypot/CVE-2021-41773POC Details
82Nonehttps://github.com/Fa1c0n35/CVE-2021-41773POC Details
83Nonehttps://github.com/puckiestyle/CVE-2021-41773POC Details
84Nonehttps://github.com/zer0qs/CVE-2021-41773POC Details
85Nonehttps://github.com/DoTuan1/Reserch-CVE-2021-41773POC Details
86Environment for CVE-2021-41773 recreation.https://github.com/bernardas/netsec-polygonPOC Details
87CVE-2021-41773 | CVE-2021-42013 Exploit Tool (Apache/2.4.49-2.4.50)https://github.com/CalfCrusher/Path-traversal-RCE-Apache-2.4.49-2.4.50-ExploitPOC Details
88Nonehttps://github.com/vuongnv3389-sec/cve-2021-41773POC Details
89Nonehttps://github.com/Chocapikk/CVE-2021-41773POC Details
90CVE-2021-41773&CVE-2021-42013图形化漏洞检测利用工具https://github.com/wangfly-me/Apache_Penetration_ToolPOC Details
91CVE-2021-41773 Shodan scannerhttps://github.com/anldori/CVE-2021-41773-ScannerPOC Details
92Essay (and PoCs) about CVE-2021-41773, a remote code execution vulnerability in Apache 2.4.49 🕸️https://github.com/iosifache/ApacheRCEEssayPOC Details
93CVE-2021-41773 | Apache HTTP Server 2.4.49 is vulnerable to Path Traversal and Remote Code execution attacks https://github.com/Habib0x0/CVE-2021-41773POC Details
94A flaw was found in a change made to path normalization in Apache HTTP Server 2.4.49. An attacker could use a path traversal attack to map URLs to files outside the directories configured by Alias-like directives. If files outside of these directories are not protected by the usual default configuration "require all denied", these requests can succeed. If CGI scripts are also enabled for these aliased pathes, this could allow for remote code execution. This issue is known to be exploited in the wild. This issue only affects Apache 2.4.49 and not earlier versions. The fix in Apache HTTP Server 2.4.50 was found to be incomplete, see CVE-2021-42013.https://github.com/pwn3z/CVE-2021-41773-Apache-RCEPOC Details
95Mitigation/fix of CVE-2021-41773 A Path Traversal And File Disclosure Vulnerability In Apachehttps://github.com/EkamSinghWalia/Mitigation-Apache-CVE-2021-41773-POC Details
96CVE-2021-41773 Gaurav Raj's exploit modified by Plunderhttps://github.com/Plunder283/CVE-2021-41773POC Details
97Nonehttps://github.com/mightysai1997/cve-2021-41773POC Details
98Nonehttps://github.com/mightysai1997/CVE-2021-41773hPOC Details
99Nonehttps://github.com/mightysai1997/cve-2021-41773-v-POC Details
100Nonehttps://github.com/mightysai1997/CVE-2021-41773-i-POC Details
101Nonehttps://github.com/mightysai1997/CVE-2021-41773-L-POC Details
102Nonehttps://github.com/mightysai1997/CVE-2021-41773-PoCPOC Details
103Nonehttps://github.com/mightysai1997/CVE-2021-41773.git1POC Details
104Nonehttps://github.com/mightysai1997/CVE-2021-41773mPOC Details
105Nonehttps://github.com/mightysai1997/CVE-2021-41773SPOC Details
106Nonehttps://github.com/dileepdkumar/LayarKacaSiber-CVE-2021-41773POC Details
107apache路径穿越漏洞poc&exphttps://github.com/aqiao-jashell/CVE-2021-41773POC Details
108python编写的apache路径穿越poc&exphttps://github.com/aqiao-jashell/py-CVE-2021-41773POC Details
109Vulnerable configuration Apache HTTP Server version 2.4.49https://github.com/12345qwert123456/CVE-2021-41773POC Details
110Apache HTTP-Server 2.4.49-2.4.50 Path Traversal & Remote Code Execution PoC (CVE-2021-41773 & CVE-2021-42013)https://github.com/blackn0te/Apache-HTTP-Server-2.4.49-2.4.50-Path-Traversal-Remote-Code-ExecutionPOC Details
111Exploit for path transversal vulnerability in apachehttps://github.com/TheKernelPanic/exploit-apache2-cve-2021-41773POC Details
112CVE-2021-41773 vulnerable apache version 2.4.49 lab set-up.https://github.com/retrymp3/apache2.4.49VulnerableLabSetupPOC Details
113A little demonstration of cve-2021-41773 on httpd docker containershttps://github.com/MatanelGordon/docker-cve-2021-41773POC Details
114Exploit created in python3 to exploit known vulnerabilities in Apache web server (CVE-2021-41773, CVE-2021-42013)https://github.com/0xGabe/Apache-CVEsPOC Details
115Exploit CVE-2021-41773 and CVE-2021-42013https://github.com/OfriOuzan/CVE-2021-41773_CVE-2021-42013_ExploitsPOC Details
116Simple Metasploit-Framework module for conducting website penetration tests (CVE-2021-41773).https://github.com/belajarqywok/CVE-2021-41773-MSFPOC Details
117Nonehttps://github.com/Iris288/CVE-2021-41773POC Details
118Nonehttps://github.com/ilurer/CVE-2021-41773-42013POC Details
119CVE-2021-41773, CVE-2021-42013https://github.com/OpenCVEs/CVE-2021-41773POC Details
120CVE-2021-41773.pyhttps://github.com/Maybe4a6f7365/CVE-2021-41773POC Details
121Nonehttps://github.com/5l1v3r1/CVE-2021-41773-42013POC Details
122POC & Lab For CVE-2021-41773https://github.com/0xc4t/CVE-2021-41773POC Details
123Apache-HTTP-Server-2.4.50-RCE This tool is designed to test Apache servers for the CVE-2021-41773 / CVE-2021-42013 vulnerability. It is intended for educational purposes only and should be used responsibly on systems you have explicit permission to test.https://github.com/Zyx2440/Apache-HTTP-Server-2.4.50-RCEPOC Details
124Apache: a Mainstream Web Service Turned a Vector of Attack for Remote Code Executionhttps://github.com/jkska23/Additive-Vulnerability-Analysis-CVE-2021-41773POC Details
125This document provides step-by-step instructions on performing a proof of concept (PoC) exploit on Apache HTTP Server 2.4.29, taking advantage of the path traversal vulnerability (CVE-2021-41773) and the globally accessible /tmp folder on Linux and MITIGATIONhttps://github.com/nwclasantha/Apache_2.4.29_ExploitPOC Details
126Nonehttps://github.com/redspy-sec/CVE-2021-41773POC Details
127MASS CVE-2021-41773https://github.com/FakesiteSecurity/CVE-2021-41773POC Details
128Nonehttps://github.com/Taldrid1/cve-2021-41773POC Details
129This repository contains a Proof-of-Concept for the CVE-2021-41773. This CVE contains a LFI and RCE vulnerablity.https://github.com/tiemio/SSH-key-and-RCE-PoC-for-CVE-2021-41773POC Details
130 Apache HTTP Server 2.4.49, 2.4.50 - Path Traversal & RCEhttps://github.com/ch4os443/CVE-2021-41773POC Details
131In this project, I documented a detailed penetration testing process targeting Apache HTTP Server vulnerabilities, specifically CVE-2021-41773 and CVE-2021-42013, which involve Path Traversal and Remote Code Execution (RCE).https://github.com/Vanshuk-Bhagat/Apache-HTTP-Server-Vulnerabilities-CVE-2021-41773-and-CVE-2021-42013POC Details
132CVE-2021-41773 https://github.com/javaamo/CVE-2021-41773POC Details
133The POC and Lab setup documentation of CVE 2021 41773 https://github.com/ashique-thaha/CVE-2021-41773-POCPOC Details
134On the 11/11/21 the apache 2.4.49-2.4.50 remote command execution POC has been published online and this is a loader so that you can mass exploit servers using this.https://github.com/Soliux/CVE-2021-41773POC Details
135Nonehttps://github.com/luongchivi/CVE-2021-41773POC Details
136Nonehttps://github.com/luongchivi/Preproduce-CVE-2021-41773POC Details
137A flaw was found in a change made to path normalization in Apache HTTP Server 2.4.49. An attacker could use a path traversal attack to map URLs to files outside the expected document root. If files outside of the document root are not protected by "require all denied" these requests can succeed. Additionally, this flaw could leak the source of interpreted files like CGI scripts. This issue is known to be exploited in the wild. This issue only affects Apache 2.4.49 and not earlier versions. https://github.com/projectdiscovery/nuclei-templates/blob/main/http/cves/2021/CVE-2021-41773.yamlPOC Details
138Nonehttps://github.com/Threekiii/Awesome-POC/blob/master/%E4%B8%AD%E9%97%B4%E4%BB%B6%E6%BC%8F%E6%B4%9E/Apache%20HTTPd%20%E8%B7%AF%E5%BE%84%E7%A9%BF%E8%B6%8A%E6%BC%8F%E6%B4%9E%20CVE-2021-41773.mdPOC Details
139Nonehttps://github.com/Threekiii/Awesome-POC/blob/master/%E4%B8%AD%E9%97%B4%E4%BB%B6%E6%BC%8F%E6%B4%9E/Apache%20HTTP%20Server%202.4.49%20%E8%B7%AF%E5%BE%84%E7%A9%BF%E8%B6%8A%E6%BC%8F%E6%B4%9E%20CVE-2021-41773.mdPOC Details
140Nonehttps://github.com/chaitin/xray-plugins/blob/main/poc/manual/apache-httpd-cve-2021-41773-rce.ymlPOC Details
141https://github.com/vulhub/vulhub/blob/master/httpd/CVE-2021-41773/README.mdPOC Details
142Kiểm thử xâm nhập https://github.com/khaidtraivch/CVE-2021-41773-Apache-2.4.49-POC Details
143Apache 2.4.49 Exploithttps://github.com/RizqiSec/CVE-2021-41773POC Details
144Nonehttps://github.com/Ask-os/CVE-2021-41773POC Details
145Nonehttps://github.com/CyberQuestor-infosec/CVE-2021-41773-Apache_2.4.49-Path-traversal-to-RCEPOC Details
146 Detects Apache HTTP Server path traversal vulnerabilities (CVE-2021-41773, CVE-2021-42013) by checking for exposure of /etc/passwd through various traversal techniques.https://github.com/psibot/apache-vulnerablePOC Details
147Python exploit for CVE-2021-41773 - Apache HTTP Server 2.4.49 Path Traversal vulnerabilityhttps://github.com/blu3ming/PoC-CVE-2021-41773POC Details
148Nonehttps://github.com/r0otk3r/CVE-2021-41773POC Details
149Nonehttps://github.com/AzK-os-dev/CVE-2021-41773POC Details
150Nonehttps://github.com/rajaabdullahnasir/CVE-2021-41773_exploitationPOC Details
151Nonehttps://github.com/JIYUN02/cve-2021-41773POC Details
152Bash POC script for RCE vulnerability in Apache 2.4.49https://github.com/mah4nzfr/CVE-2021-41773POC Details
153Nonehttps://github.com/charanvoonna/CVE-2021-41773POC Details
154Docker container lab to play/learn with CVE-2021-41773https://github.com/twseptian/cve-2021-41773-docker-labPOC Details
155CTF_WRITEUPS/TryHackMe /CVE-2021-41773/https://github.com/hackedrishi/CTF_WRITEUPS-TryHackMe-CVE-2021-41773-POC Details
156Documented CVE-2021-41773 (Apache HTTP Server path traversal, CVSS 9.8) — produced CVSS breakdown, impact assessment, and a mitigation plan (patch to 2.4.51+, CGI disable, firewall) and published the analysis on GitHub.https://github.com/MuhammadHuzaifaAsif/security-labPOC Details
157Remote Code Execution PoC for Apache 2.4.49https://github.com/gunzf0x/CVE-2021-41773POC Details
158Nonehttps://github.com/AzkOsDev/CVE-2021-41773POC Details
159Nonehttps://github.com/Mahfujurjust/CVE-2021-41773POC Details
160Nonehttps://github.com/adrianmafandy/CVE-2021-41773POC Details
161Path Traversal Apache HTTP Server 2.4.49/2.4.50https://github.com/faizdotid/CVE-2021-41773POC Details
162Apache CVE-2021-41773https://github.com/rikdek/CVE-2021-41773POC Details
163Technical analysis and reproduction lab for the Apache HTTP Server 2.4.49 Path Traversal and RCE vulnerability.https://github.com/ChanaPCN/CVE-2021-41773-AnalysisPOC Details
164A simple Python proof-of-concept tool to check for Apache path traversal vulnerability (CVE-2021-41773). Detects vulnerable server versions and verifies exploitation by probing sensitive files. Built for learning CVE analysis, not mass exploitation.https://github.com/sudo0xksh/cve-2021-41773-checkerPOC Details
165PoC скрипт для CVE-2021-41773 - Path Traversal в Apache 2.4.49https://github.com/dserdyk3-arch/Serdyuk-DO-homework-CVE-2021-41773POC Details
166Nonehttps://github.com/ISabbiI/PoC-Apache-CVE-2021-41773-Infrastructure-LABPOC Details
167This program Prompts you for the Local File Inclusion information and will automatically search the /etc/passwd and using the users names found will search for and download any SSH key or variation of keys to the local computer. This program also performs the CVE-2021-41773_ apache2.4.49 and 50 traversal path exploit. In addtion to other LFI Vulnhttps://github.com/RevShellXD/LFI-DestructionPOC Details
AI-Generated POCPremium

No public POC found.

Login to generate AI POC

III. Intelligence Information for CVE-2021-41773

登录查看更多情报信息。

IV. Related Vulnerabilities

V. Comments for CVE-2021-41773

No comments yet


Leave a comment