vendor:
Apache Web Server
by:
Rodrigo Marcos
2.6
CVSS
LOW
Apache Scanning
287
CWE
Product Name: Apache Web Server
Affected Version From: N/A
Affected Version To: N/A
Patch Exists: NO
Related CWE: CVE-2011-3368
CPE: N/A
Metasploit:
https://www.rapid7.com/db/vulnerabilities/f5-big-ip-cve-2012-0021/, https://www.rapid7.com/db/vulnerabilities/f5-big-ip-cve-2012-0053/, https://www.rapid7.com/db/vulnerabilities/linuxrpm-RHSA-2012-0323/, https://www.rapid7.com/db/vulnerabilities/linuxrpm-RHSA-2012-0128/, https://www.rapid7.com/db/vulnerabilities/f5-big-ip-cve-2012-0031/, https://www.rapid7.com/db/vulnerabilities/apple-osx-note-cve-2011-4317/, https://www.rapid7.com/db/vulnerabilities/suse-cve-2011-3639/, https://www.rapid7.com/db/vulnerabilities/hpsmh-cve-2011-3639/, https://www.rapid7.com/db/vulnerabilities/hpsmh-cve-2011-4317/, https://www.rapid7.com/db/vulnerabilities/gentoo-linux-cve-2011-4317/, https://www.rapid7.com/db/vulnerabilities/apple-osx-apache-cve-2011-4317/, https://www.rapid7.com/db/vulnerabilities/suse-cve-2011-4317/, https://www.rapid7.com/db/vulnerabilities/centos_linux-cve-2011-4317/, https://www.rapid7.com/db/vulnerabilities/ibm-http_server-cve-2011-3639/, https://www.rapid7.com/db/vulnerabilities/f5-big-ip-cve-2011-4317/, https://www.rapid7.com/db/vulnerabilities/centos_linux-cve-2011-3639/, https://www.rapid7.com/db/vulnerabilities/ibm-http_server-cve-2011-4317/, https://www.rapid7.com/db/vulnerabilities/oracle-solaris-cve-2011-4317/, https://www.rapid7.com/db/vulnerabilities/apple-osx-note-cve-2011-3368/, https://www.rapid7.com/db/vulnerabilities/gentoo-linux-cve-2011-3368/, https://www.rapid7.com/db/?q=CVE-2011-3368&type=&page=2, https://www.rapid7.com/db/?q=CVE-2011-3368&type=&page=2
Other Scripts:
https://www.infosecmatter.com/nmap-nse-library/?nse=http-vuln-cve2011-3368, https://www.infosecmatter.com/nessus-plugin-library/?id=56972, https://www.infosecmatter.com/nessus-plugin-library/?id=77326, https://www.infosecmatter.com/metasploit-module-library/?mm=auxiliary/scanner/http/rewrite_proxy_bypass, https://www.infosecmatter.com/nessus-plugin-library/?id=62214, https://www.infosecmatter.com/nessus-plugin-library/?id=80192, https://www.infosecmatter.com/nessus-plugin-library/?id=68377, https://www.infosecmatter.com/nessus-plugin-library/?id=59678, https://www.infosecmatter.com/nessus-plugin-library/?id=58252, https://www.infosecmatter.com/nessus-plugin-library/?id=58811
Tags: N/A
CVSS Metrics: N/A
Nuclei References:
N/A
Nuclei Metadata: N/A
Platforms Tested: All
2011
Apache Scan
Apache Scanning is a technique used to scan the ports of a remote host using an Apache web server. It is done by sending a GET request to the Apache server with the target host and port as parameters. The response from the server will indicate whether the port is open, closed, or filtered.
Mitigation:
Disable the Apache server or configure it to only allow requests from trusted sources.