高度な大規模言語モデル技術を使用していますが、出力には不正確または古い情報が含まれる可能性があります。Shenlongはデータの正確性を確保するよう努めていますが、実際の状況に基づいて検証・判断してください。
| ベンダー | プロダクト | 影響を受けるバージョン | CPE | 購読 |
|---|---|---|---|---|
| Apache Software Foundation | Apache HTTP Server | 2.4.0 ~ 2.4.59 | - |
| # | POC説明 | ソースリンク | Shenlongリンク |
|---|---|---|---|
| 1 | None | https://github.com/p0in7s/CVE-2024-38475 | POC詳細 |
| 2 | exploit CVE-2024-38475(mod_rewrite weakness with filesystem path matching) | https://github.com/soltanali0/CVE-2024-38475 | POC詳細 |
| 3 | Improper escaping of output in mod_rewrite in Apache HTTP Server 2.4.59 and earlier allows an attacker to map URLs to filesystem locations that are permitted to be served by the server but are not intentionally/directly reachable by any URL, resulting in code execution or source code disclosure. Substitutions in server context that use a backreferences or variables as the first segment of the substitution are affected. Some unsafe RewiteRules will be broken by this change and the rewrite flag "UnsafePrefixStat" can be used to opt back in once ensuring the substitution is appropriately constrained. | https://github.com/projectdiscovery/nuclei-templates/blob/main/http/cves/2024/CVE-2024-38475.yaml | POC詳細 |
| 4 | CVE-2024-38475 Scanner using FFUF + Seclists | https://github.com/syaifulandy/CVE-2024-38475 | POC詳細 |
| 5 | None | https://github.com/abrewer251/CVE-2024-38475_SonicBoom_Apache_URL_Traversal_PoC | POC詳細 |
公開POCは見つかりませんでした。
ログインしてAI POCを生成| CVE-2024-36387 | Apache HTTP Server: DoS by Null pointer in websocket over HTTP/2 | |
| CVE-2024-38472 | Apache HTTP Server on WIndows UNC SSRF | |
| CVE-2024-38473 | Apache HTTP Server proxy encoding problem | |
| CVE-2024-38474 | Apache HTTP Server weakness with encoded question marks in backreferences | |
| CVE-2024-38476 | Apache HTTP Server may use exploitable/malicious backend application output to run local h | |
| CVE-2024-38477 | Apache HTTP Server: Crash resulting in Denial of Service in mod_proxy via a malicious requ | |
| CVE-2024-39573 | Apache HTTP Server: mod_rewrite proxy handler substitution |
まだコメントはありません