Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2023-38709 PoC — Apache HTTP Server: HTTP response splitting

Source
Associated Vulnerability
Title:Apache HTTP Server: HTTP response splitting (CVE-2023-38709)
Description:Faulty input validation in the core of Apache allows malicious or exploitable backend/content generators to split HTTP responses. This issue affects Apache HTTP Server: through 2.4.58.
Description
Apache HTTP Server Vulnerability Testing Tool | PoC for CVE-2024-38472 , CVE-2024-39573 , CVE-2024-38477 , CVE-2024-38476 , CVE-2024-38475 , CVE-2024-38474 ,  CVE-2024-38473 , CVE-2023-38709
Readme
# Apache HTTP Server Vulnerability Testing Tool

This repository provides a **Proof of Concept (PoC)** for testing various vulnerabilities in the Apache HTTP Server, including Filename Confusion Attacks, SSRF, Denial of Service, and others related to recent CVEs. The tool sends crafted HTTP requests to assess whether the server is vulnerable to certain types of attacks.

## Features
- Tests for multiple vulnerabilities including:
  - **CVE-2024-38472**: Apache HTTP Server on Windows UNC SSRF
  - **CVE-2024-39573**: mod_rewrite proxy handler substitution
  - **CVE-2024-38477**: Crash resulting in Denial of Service in mod_proxy
  - **CVE-2024-38476**: Exploitable backend application output causing internal redirects
  - **CVE-2024-38475**: mod_rewrite weakness with filesystem path matching
  - **CVE-2024-38474**: Weakness with encoded question marks in backreferences
  - **CVE-2024-38473**: mod_proxy proxy encoding problem
  - **CVE-2023-38709**: HTTP response splitting
- Provides an easy-to-use command-line interface for testing various endpoints.

## How It Works
The tool performs HTTP requests to potential endpoints that might be vulnerable to confusion attacks or misconfigurations. It checks for specific patterns and encodings that could lead to unauthorized access or system failures.

### Testing Targets
The tool checks for vulnerabilities on the following paths:
- **php-info.php**
- **xmlrpc.php**
- **adminer.php**
- **bin/cron.php**
- **cache/index.tpl.php**
- **cgi-bin/redir.cgi**
- Others with encoded URLs for potential bypass.

## Getting Started

### Prerequisites
- **Python 3.x** installed on your system.
- **Requests** library for Python to send HTTP requests.

You can install the required Python library using:
```bash
pip install requests
```
## Installation
Clone this repository:
```bash
git clone https://github.com/mrmtwoj/apache-vulnerability-testing.git
cd apache-vulnerability-testing
```
### Usage
To use the tool, provide the target URL you want to test:
```bash
python3 poc_vulnerability_testing.py --target http://<target-ip>
```
### For example:
```bash
python3 poc_vulnerability_testing.py --target http://192.168.1.10
```
## Command-Line Arguments
- **target**: The URL of the Apache server to test (e.g., http://example.com).
- **info**: Display tool information, such as the developer name, version, and related CVEs.
- **about**: Display information about the tool and its purpose.


File Snapshot

[4.0K] /data/pocs/1c321608aa40402e6ea8c7ca16739a25acd07c06 ├── [3.2K] poc_vulnerability_testing.py └── [2.4K] README.md 0 directories, 2 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. Local POC snapshots are reserved for subscribers — if the original source is unavailable, the local mirror is part of the paid plan.
    3. Mirroring, verifying, and maintaining this POC archive takes ongoing effort, so local snapshots are a paid feature. Your subscription keeps the archive online — thank you for the support. View subscription plans →