Apache HTTP Server, Path Traversal and File Disclosure, CVE-2021-41773 (Critical)

Listen to this Post

How the CVE Works:

CVE-2021-41773 is a path traversal vulnerability in Apache HTTP Server 2.4.49. The flaw arises due to improper validation of URLs in the `ap_normalize_path()` function, allowing attackers to bypass security restrictions using crafted paths containing `./` sequences. If `mod_cgi` is enabled, remote attackers can execute arbitrary commands by sending malicious requests. The vulnerability exposes files outside the document root when the `require all denied` directive is misconfigured, leading to unauthorized access.

DailyCVE Form:

Platform: Apache HTTP Server
Version: 2.4.49
Vulnerability: Path Traversal
Severity: Critical
Date: 2021-10-05

Prediction: Patch by 2021-10-15

What Undercode Say:

curl -v "http://target.com/cgi-bin/.%2e/%2e%2e/%2e%2e/etc/passwd"
<Directory "/var/www/html">
Require all denied
</Directory>

How Exploit:

  • Craft HTTP requests with `.%2e/` sequences.
  • Bypass path normalization to access /etc/passwd.
  • Execute OS commands if `mod_cgi` is active.

Protection from this CVE:

  • Upgrade to Apache 2.4.50.
  • Disable `mod_cgi` if unused.
  • Enforce strict `Require all denied` rules.

Impact:

  • Remote code execution (RCE).
  • Sensitive file disclosure.
  • Server compromise.

Sources:

Reported By: www.cve.org
Extra Source Hub:
Undercode

πŸ”JOIN OUR CYBER WORLD [ CVE News β€’ HackMonitor β€’ UndercodeNews ]

πŸ’¬ Whatsapp | πŸ’¬ Telegram

πŸ“’ Follow DailyCVE & Stay Tuned:

𝕏 formerly Twitter 🐦 | @ Threads | πŸ”— Linkedin Featured Image

Scroll to Top