vendor:
Apache HTTP Server
by:
Valentin Lobstein
7.5
CVSS
HIGH
Remote Code Execution (RCE)
CWE
Product Name: Apache HTTP Server
Affected Version From: Apache 2.4.49
Affected Version To: Apache 2.4.50
Patch Exists: NO
Related CWE: CVE-2021-41773 / CVE-2021-42013
CPE: a:apache:http_server:2.4.49 cpe:/a:apache:http_server:2.4.50
Metasploit:
https://www.rapid7.com/db/vulnerabilities/oracle-solaris-cve-2021-41773/, https://www.rapid7.com/db/vulnerabilities/oracle-solaris-cve-2021-42013/, https://www.rapid7.com/db/vulnerabilities/amazon-linux-ami-2-cve-2021-42013/, https://www.rapid7.com/db/vulnerabilities/amazon-linux-ami-2-cve-2021-41773/, https://www.rapid7.com/db/vulnerabilities/freebsd-cve-2021-42013/, https://www.rapid7.com/db/vulnerabilities/apache-httpd-cve-2021-42013/, https://www.rapid7.com/db/vulnerabilities/gentoo-linux-cve-2021-42013/, https://www.rapid7.com/db/vulnerabilities/amazon_linux-cve-2021-42013/, https://www.rapid7.com/db/vulnerabilities/freebsd-cve-2021-41773/, https://www.rapid7.com/db/vulnerabilities/amazon_linux-cve-2021-41773/, https://www.rapid7.com/db/vulnerabilities/gentoo-linux-cve-2021-41773/, https://www.rapid7.com/db/modules/exploit/multi/http/apache_normalize_path_rce/, https://www.rapid7.com/db/modules/auxiliary/scanner/http/apache_normalize_path/
Tags: cve,cve2021,lfi,apache,rce,misconfig,traversal,kev
CVSS Metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Nuclei References:
https://httpd.apache.org/security/vulnerabilities_24.html, https://github.com/apache/httpd/commit/5c385f2b6c8352e2ca0665e66af022d6e936db6d, https://nvd.nist.gov/vuln/detail/CVE-2021-42013, https://twitter.com/itsecurityco/status/1446136957117943815, http://jvn.jp/en/jp/JVN51106450/index.html
Nuclei Metadata: {'max-request': 3, 'verified': True, 'vendor': 'apache', 'product': 'http_server'}
Platforms Tested: Debian GNU/Linux
2021
Apache HTTP Server 2.4.50 – Remote Code Execution (RCE) (3)
This exploit allows an attacker to execute arbitrary code remotely on the Apache HTTP Server version 2.4.50. The vulnerability was assigned CVE-2021-41773 and CVE-2021-42013.
Mitigation:
Apply the vendor's patch or update to Apache 2.4.51 or later.