Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2011-3368 PoC — Apache HTTP Server多个模式输入验证错误漏洞

Source
Associated Vulnerability
Title:Apache HTTP Server多个模式输入验证错误漏洞 (CVE-2011-3368)
Description:The mod_proxy module in the Apache HTTP Server 1.3.x through 1.3.42, 2.0.x through 2.0.64, and 2.2.x through 2.2.21 does not properly interact with use of (1) RewriteRule and (2) ProxyPassMatch pattern matches for configuration of a reverse proxy, which allows remote attackers to send requests to intranet servers via a malformed URI containing an initial @ (at sign) character.
Description
PoC Scan. (cve-2011-3368)
Readme
# CVE-2011-3368

PoC Exploit. (cve-2011-3368)

# Install:

git clone https://github.com/colorblindpentester/CVE-2011-3368

cd CVE-2011-3368

python2 CVE-2011-3368.py

# Tested on:

OS X (macos)

Parrot OS 

Kali linux
File Snapshot

[4.0K] /data/pocs/e3c5949627069bfded1eabd54096f3dd277bc9aa ├── [3.9K] CVE-2011-3368_poc.py └── [ 218] README.md 0 directories, 2 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. Local POC snapshots are reserved for subscribers — if the original source is unavailable, the local mirror is part of the paid plan.
    3. Mirroring, verifying, and maintaining this POC archive takes ongoing effort, so local snapshots are a paid feature. Your subscription keeps the archive online — thank you for the support. View subscription plans →