exploitdb
WORKING POC
VERIFIED
by Lucas Souza · bashwebappsmultiple
https://www.exploit-db.com/exploits/50383
This script exploits CVE-2021-41773, a path traversal vulnerability in Apache HTTP Server 2.4.49, allowing remote code execution via crafted CGI requests. It sends a malicious curl request to traverse directories and execute arbitrary commands.
Classification
Working Poc 95%
Target:
Apache HTTP Server 2.4.49
No auth needed
Prerequisites:
Target running Apache HTTP Server 2.4.49 · CGI module enabled
nomisec
WORKING POC
210 stars
by blasty · remote
https://github.com/blasty/CVE-2021-41773
This repository provides a Docker-based environment to test CVE-2021-41773, a path traversal and command injection vulnerability in Apache HTTP Server 2.4.49. It includes examples for local file disclosure and remote code execution via crafted HTTP requests.
Classification
Working Poc 100%
Attack Type
Rce | Info Leak
Target:
Apache HTTP Server 2.4.49
No auth needed
Prerequisites:
Docker environment · Apache HTTP Server 2.4.49 with CGI enabled
nomisec
SCANNER
148 stars
by inbug-team · poc
https://github.com/inbug-team/CVE-2021-41773_CVE-2021-42013
This repository provides a multithreaded tool for detecting and exploiting CVE-2021-41773 and CVE-2021-42013 vulnerabilities. It appears to be a scanner or detection tool rather than a full exploit PoC, as no exploit code is provided in the shared files.
Classification
Scanner 80%
Target:
Apache HTTP Server 2.4.49 (CVE-2021-41773), Apache HTTP Server 2.4.50 (CVE-2021-42013)
No auth needed
Prerequisites:
Target running vulnerable Apache HTTP Server version
nomisec
WORKING POC
63 stars
by HightechSec · poc
https://github.com/HightechSec/scarce-apache2
This repository contains a bash script for scanning and exploiting CVE-2021-41773, a path traversal and command injection vulnerability in Apache HTTP Server 2.4.49. The tool supports both single and mass target scanning, as well as remote command execution if MOD_CGI is enabled.
Classification
Working Poc | Scanner 95%
Attack Type
Rce | Info Leak
Target:
Apache HTTP Server 2.4.49
No auth needed
Prerequisites:
MOD_CGI enabled on the target server · curl installed on the attacker's machine
nomisec
SCANNER
61 stars
by MrCl0wnLab · infoleak
https://github.com/MrCl0wnLab/SimplesApachePathTraversal
This repository contains a Python-based scanner for detecting Apache path traversal vulnerabilities, specifically CVE-2020-17519, CVE-2021-41773, and CVE-2021-42013. It includes modules for handling requests, threading, and file operations to test multiple targets efficiently.
Classification
Scanner 90%
Target:
Apache HTTP Server
No auth needed
Prerequisites:
List of target IPs or ranges · Network access to target systems
nomisec
WORKING POC
49 stars
by iilegacyyii · remote
https://github.com/iilegacyyii/PoC-CVE-2021-41773
This PoC checks if an Apache HTTP Server is vulnerable to CVE-2021-41773, a path traversal flaw in versions 2.4.49 and 2.4.50. It attempts to read a known file outside the document root to confirm vulnerability.
Classification
Working Poc 90%
Target:
Apache HTTP Server 2.4.49, 2.4.50
No auth needed
Prerequisites:
Target running Apache HTTP Server 2.4.49 or 2.4.50 · Access to the target server
nomisec
WORKING POC
39 stars
by Vulnmachines · remote
https://github.com/Vulnmachines/cve-2021-41773
This repository provides a proof-of-concept for CVE-2021-41773, a path traversal vulnerability in Apache 2.4.49 that can lead to remote code execution (RCE) via crafted HTTP requests. The payloads demonstrate directory traversal and command injection techniques.
Classification
Working Poc 90%
Target:
Apache HTTP Server 2.4.49
No auth needed
Prerequisites:
Apache 2.4.49 with vulnerable configuration
nomisec
WORKING POC
38 stars
by lorddemon · infoleak
https://github.com/lorddemon/CVE-2021-41773-PoC
This is a Python script that tests for CVE-2021-41773, a path traversal vulnerability in Apache HTTP Server 2.4.49. It attempts to read the /etc/passwd file by exploiting the vulnerability and checks if the target server is vulnerable.
Classification
Working Poc 95%
Target:
Apache HTTP Server 2.4.49
No auth needed
Prerequisites:
Target server running Apache HTTP Server 2.4.49 · Network access to the target server
nomisec
WORKING POC
29 stars
by justakazh · infoleak
https://github.com/justakazh/mass_cve-2021-41773
This repository contains multiple Python scripts for exploiting CVE-2021-41773, a path traversal vulnerability in Apache HTTP Server. The scripts include a mass scanner, an RCE exploit, and a manual command execution tool.
Classification
Working Poc 95%
Target:
Apache HTTP Server 2.4.49
No auth needed
Prerequisites:
Target running vulnerable Apache HTTP Server · Network access to the target
nomisec
WORKING POC
23 stars
by BlueTeamSteve · poc
https://github.com/BlueTeamSteve/CVE-2021-41773
This repository provides vulnerable Docker images and PoC commands for CVE-2021-41773, a path traversal vulnerability in Apache HTTP Server 2.4.49. It includes configurations for both file read and remote code execution (RCE) scenarios.
Classification
Working Poc 100%
Attack Type
Rce | Info Leak
Target:
Apache HTTP Server 2.4.49
No auth needed
Prerequisites:
Apache HTTP Server 2.4.49 with specific non-default configurations · Docker environment for testing
nomisec
SCANNER
22 stars
by im-hanzou · poc
https://github.com/im-hanzou/apachrot
This repository contains a mass vulnerability scanner for CVE-2021-41773 and CVE-2021-42013, targeting Apache 2.4.49 and 2.4.50. It uses GNU Parallel to check multiple targets for path traversal and command injection vulnerabilities.
Classification
Scanner 90%
Target:
Apache HTTP Server 2.4.49, 2.4.50
No auth needed
Prerequisites:
GNU Parallel installed · List of target URLs
nomisec
WORKING POC
21 stars
by Ls4ss · remote
https://github.com/Ls4ss/CVE-2021-41773_CVE-2021-42013
This PoC exploits a path traversal vulnerability (CVE-2021-41773) and RCE (CVE-2021-42013) in Apache HTTP Server 2.4.49/2.4.50 by sending crafted requests to execute arbitrary commands or read files. The script automates the attack against a list of targets.
Classification
Working Poc 95%
Target:
Apache HTTP Server 2.4.49, 2.4.50
No auth needed
Prerequisites:
Target running vulnerable Apache version · Network access to the target
nomisec
SCANNER
17 stars
by ZephrFish · remote
https://github.com/ZephrFish/CVE-2021-41773-PoC
This repository contains a Python-based scanner for CVE-2021-41773, a path traversal vulnerability in Apache HTTP Server 2.4.49. The scripts attempt to read /etc/passwd via malformed URI paths to determine if a host is vulnerable.
Classification
Scanner 90%
Target:
Apache HTTP Server 2.4.49
No auth needed
Prerequisites:
Target running Apache HTTP Server 2.4.49 with vulnerable configuration
nomisec
WORKING POC
15 stars
by wangfly-me · poc
https://github.com/wangfly-me/Apache_Penetration_Tool
This repository describes a QT C++ tool for exploiting CVE-2021-41773, a path traversal and command execution vulnerability in Apache HTTP Server. The tool includes features for vulnerability detection, directory traversal, command execution, and reverse shell functionality.
Classification
Working Poc 90%
Attack Type
Rce | Info Leak
Target:
Apache HTTP Server 2.4.49
No auth needed
Prerequisites:
Network access to target Apache server · Apache HTTP Server 2.4.49 with vulnerable configuration
nomisec
WORKING POC
12 stars
by blackn0te · remote
https://github.com/blackn0te/Apache-HTTP-Server-2.4.49-2.4.50-Path-Traversal-Remote-Code-Execution
This repository contains a functional PoC for CVE-2021-41773 and CVE-2021-42013, targeting path traversal and remote code execution vulnerabilities in Apache HTTP Server 2.4.49-2.4.50. The exploit leverages crafted paths to bypass security checks and execute commands or read arbitrary files.
Classification
Working Poc 95%
Attack Type
Rce | Info Leak
Target:
Apache HTTP Server 2.4.49-2.4.50
No auth needed
Prerequisites:
Target running vulnerable Apache HTTP Server version · Network access to the target
nomisec
WORKING POC
12 stars
by itsecurityco · infoleak
https://github.com/itsecurityco/CVE-2021-41773
This repository provides a working proof-of-concept for CVE-2021-41773, a path traversal vulnerability in Apache HTTP Server 2.4.49. It includes a Docker setup to replicate the vulnerable environment and demonstrates how to exploit the flaw to read arbitrary files (e.g., /etc/passwd) using URL-encoded dot segments.
Classification
Working Poc 100%
Target:
Apache HTTP Server 2.4.49
No auth needed
Prerequisites:
Apache HTTP Server 2.4.49 with misconfigured <Directory /> section (Require all granted)
nomisec
WORKING POC
12 stars
by Zeop-CyberSec · poc
https://github.com/Zeop-CyberSec/apache_normalize_path
This repository contains a working PoC for CVE-2021-41773 and CVE-2021-42013, which are path traversal and RCE vulnerabilities in Apache HTTP Server 2.4.49 and 2.4.50. It includes Metasploit modules for scanning and exploitation, along with Docker setup instructions for testing.
Classification
Working Poc 95%
Target:
Apache HTTP Server 2.4.49, 2.4.50
No auth needed
Prerequisites:
Apache HTTP Server 2.4.49 or 2.4.50 with mod_cgi enabled · Access to the target server
nomisec
WORKING POC
12 stars
by j4k0m · poc
https://github.com/j4k0m/CVE-2021-41773
This exploit leverages a directory traversal vulnerability in Apache 2.4.49 by sending a crafted HTTP GET request to access arbitrary files outside the web root. The script checks for vulnerability and retrieves the file content if successful.
Classification
Working Poc 90%
Target:
Apache HTTP Server 2.4.49
No auth needed
Prerequisites:
Target running Apache 2.4.49 · Network access to the target
nomisec
WORKING POC
11 stars
by mr-exo · poc
https://github.com/mr-exo/CVE-2021-41773
This repository provides a proof-of-concept exploit for CVE-2021-41773, a path traversal vulnerability in Apache 2.4.49 and 2.4.50 that can lead to remote code execution (RCE) under specific conditions. The exploit leverages the default '/cgi-bin/' mapping and requires mod_cgi to be enabled, along with specific permissions and executable binaries.
Classification
Working Poc 90%
Target:
Apache HTTP Server 2.4.49 and 2.4.50
No auth needed
Prerequisites:
mod_cgi enabled · target binary executable · Apache permissions for /bin or /
nomisec
WORKING POC
11 stars
by zeronine9 · poc
https://github.com/zeronine9/CVE-2021-41773
This Python script tests for CVE-2021-41773, a path traversal vulnerability in Apache HTTP Server 2.4.49. It attempts to read /etc/passwd via a crafted URI and checks for the presence of 'root' in the response.
Classification
Working Poc 95%
Target:
Apache HTTP Server 2.4.49
No auth needed
Prerequisites:
List of target URLs
nomisec
WORKING POC
9 stars
by aqiao-jashell · remote
https://github.com/aqiao-jashell/CVE-2021-41773
This Go-based PoC exploits CVE-2021-41773, a path traversal vulnerability in Apache HTTP Server 2.4.49/2.4.50, allowing arbitrary file reads and command execution via crafted requests to `/cgi-bin/.%2e/` endpoints.
Classification
Working Poc 95%
Attack Type
Rce | Info Leak
Target:
Apache HTTP Server 2.4.49, 2.4.50
No auth needed
Prerequisites:
Network access to vulnerable Apache server
nomisec
WORKING POC
9 stars
by theLSA · poc
https://github.com/theLSA/apache-httpd-path-traversal-checker
This repository contains a Python script to check and exploit the Apache HTTP Server path traversal vulnerabilities CVE-2021-41773 and CVE-2021-42013. It includes functionality for both file reading and remote command execution (RCE) if CGI is enabled.
Classification
Working Poc 95%
Attack Type
Rce | Info Leak
Target:
Apache HTTP Server 2.4.49, 2.4.50
No auth needed
Prerequisites:
Apache HTTP Server with vulnerable version · CGI module enabled for RCE · Directory access configured to allow traversal
nomisec
WORKING POC
9 stars
by 1nhann · poc
https://github.com/1nhann/CVE-2021-41773
This repository provides a proof-of-concept for CVE-2021-41773, a path traversal vulnerability in Apache HTTP Server 2.4.49. It includes detailed steps to exploit the vulnerability, achieving remote command execution (RCE) via CGI module manipulation and arbitrary file reads.
Classification
Working Poc 100%
Attack Type
Rce | Info Leak
Target:
Apache HTTP Server 2.4.49
No auth needed
Prerequisites:
Apache HTTP Server 2.4.49 with CGI module enabled · Network access to the target server
nomisec
WRITEUP
9 stars
by knqyf263 · poc
https://github.com/knqyf263/CVE-2021-41773
This repository provides a writeup and setup instructions for CVE-2021-41773, a path traversal vulnerability in Apache HTTP Server 2.4.49. It includes Docker setup for testing but does not contain actual exploit code.
Classification
Writeup 90%
Target:
Apache HTTP Server 2.4.49
No auth needed
Prerequisites:
Docker environment · Apache HTTP Server 2.4.49
nomisec
SCANNER
8 stars
by creadpag · infoleak
https://github.com/creadpag/CVE-2021-41773-POC
This repository provides an NSE (Nmap Scripting Engine) script to scan for CVE-2021-41773, a path traversal vulnerability in Apache 2.4.49. It does not include exploit code but offers a detection method via Nmap.
Classification
Scanner 90%
Target:
Apache HTTP Server 2.4.49
No auth needed
Prerequisites:
Nmap installed · Access to target server
nomisec
WORKING POC
8 stars
by CalfCrusher · remote
https://github.com/CalfCrusher/Path-traversal-RCE-Apache-2.4.49-2.4.50-Exploit
This repository contains a functional exploit for CVE-2021-41773 and CVE-2021-42013, targeting path traversal and RCE vulnerabilities in Apache HTTP Server versions 2.4.49 and 2.4.50. The exploit tests for both CGI and non-CGI configurations, leveraging path normalization flaws to read arbitrary files or execute commands.
Classification
Working Poc 95%
Attack Type
Rce | Info Leak
Target:
Apache HTTP Server 2.4.49-2.4.50
No auth needed
Prerequisites:
Target must be running Apache 2.4.49 or 2.4.50 · Files outside document root must not be protected by 'require all denied' · For RCE, CGI must be enabled
nomisec
WORKING POC
8 stars
by numanturle · poc
https://github.com/numanturle/CVE-2021-41773
This PoC exploits a path traversal vulnerability in Apache 2.4.49 by using URL-encoded dot-segment sequences to bypass normalization and access arbitrary files outside the web root. The example demonstrates reading /etc/hosts, confirming the vulnerability via a regex match for '127.0.0.1' and a 200 status code.
Classification
Working Poc 90%
Target:
Apache HTTP Server 2.4.49
No auth needed
Prerequisites:
Apache 2.4.49 with CGI enabled and vulnerable path normalization
nomisec
WORKING POC
7 stars
by aqiao-jashell · remote
https://github.com/aqiao-jashell/py-CVE-2021-41773
This repository contains a Python-based PoC and exploit for CVE-2021-41773, a path traversal vulnerability in Apache HTTP Server 2.4.49. The exploit allows reading arbitrary files (e.g., /etc/passwd) and executing commands via a crafted URL path.
Classification
Working Poc 95%
Attack Type
Info Leak | Rce
Target:
Apache HTTP Server 2.4.49
No auth needed
Prerequisites:
Target running Apache HTTP Server 2.4.49 with vulnerable configuration
nomisec
WORKING POC
7 stars
by 0xRar · poc
https://github.com/0xRar/CVE-2021-41773
This is a Python-based exploit for CVE-2021-41773, a path traversal vulnerability in Apache HTTP Server 2.4.49. It constructs a malicious URL to access arbitrary files on the target system by leveraging improper URL normalization.
Classification
Working Poc 90%
Target:
Apache HTTP Server 2.4.49
No auth needed
Prerequisites:
Target running Apache HTTP Server 2.4.49 · Network access to the target
nomisec
WORKING POC
6 stars
by belajarqywok · remote
https://github.com/belajarqywok/CVE-2021-41773-MSF
This repository contains multiple Metasploit modules and scripts targeting CVE-2021-41773, a path traversal vulnerability in Apache HTTP Server. The PoC includes file upload and remote command execution capabilities.
Classification
Working Poc 80%
Target:
Apache HTTP Server 2.4.49
No auth needed
Prerequisites:
Network access to the target server · Apache HTTP Server 2.4.49 with CGI enabled
nomisec
WRITEUP
6 stars
by noflowpls · remote
https://github.com/noflowpls/CVE-2021-41773
This repository provides a detailed writeup and Docker-based playground for testing CVE-2021-41773, a vulnerability in Apache 2.4.49 that allows both Local File Disclosure (LFD) and Remote Code Execution (RCE) via path traversal and URL encoding.
Classification
Writeup 90%
Attack Type
Rce | Info Leak
Target:
Apache HTTP Server 2.4.49
No auth needed
Prerequisites:
Docker · Apache 2.4.49 with or without cgid
nomisec
WORKING POC
6 stars
by Hydragyrum · poc
https://github.com/Hydragyrum/CVE-2021-41773-Playground
This repository provides Docker containers to test CVE-2021-41773 (Apache 2.4.49/2.4.50 path traversal and RCE). It includes vulnerable Apache instances with and without CGI enabled, allowing users to exploit the vulnerability to retrieve flags or achieve remote code execution.
Classification
Working Poc 90%
Target:
Apache HTTP Server 2.4.49/2.4.50
No auth needed
Prerequisites:
Docker installed · Network access to the vulnerable Apache instances
nomisec
WORKING POC
6 stars
by TishcaTpx · infoleak
https://github.com/TishcaTpx/POC-CVE-2021-41773
This PoC exploits CVE-2021-41773, a path traversal vulnerability in Apache HTTP Server 2.4.49, by sending a crafted request to access sensitive files like /etc/passwd. The script checks if the response contains 'root' to confirm vulnerability.
Classification
Working Poc 95%
Target:
Apache HTTP Server 2.4.49
No auth needed
Prerequisites:
Target running Apache HTTP Server 2.4.49 with vulnerable configuration
nomisec
WORKING POC
4 stars
by OfriOuzan · remote
https://github.com/OfriOuzan/CVE-2021-41773_CVE-2021-42013_Exploits
This repository contains a Python-based exploit for CVE-2021-41773 and CVE-2021-42013, which are path traversal vulnerabilities in Apache HTTPD. The exploit demonstrates file mapping and remote code execution by leveraging Docker containers for vulnerable environments.
Classification
Working Poc 95%
Target:
Apache HTTPD 2.4.49, 2.4.50
No auth needed
Prerequisites:
Docker · Python 3.7+ · Vulnerable Apache HTTPD configuration
nomisec
WORKING POC
4 stars
by LudovicPatho · remote
https://github.com/LudovicPatho/CVE-2021-41773
This repository provides a working proof-of-concept for CVE-2021-41773, a path traversal vulnerability in Apache HTTP Server 2.4.49 that can lead to remote code execution (RCE) via CGI scripts. The PoC includes steps for exploitation, including command injection and reverse shell setup.
Classification
Working Poc 100%
Target:
Apache HTTP Server 2.4.49
No auth needed
Prerequisites:
Apache HTTP Server 2.4.49 with CGI scripts enabled · Network access to the target server
nomisec
WORKING POC
4 stars
by apapedulimu · poc
https://github.com/apapedulimu/Apachuk
This PoC leverages Shodan to scan for Apache servers vulnerable to CVE-2021-41773 (path traversal and RCE). It attempts to read /etc/passwd and execute commands via a crafted payload.
Classification
Working Poc 95%
Attack Type
Rce | Info Leak
Target:
Apache HTTP Server 2.4.49
No auth needed
Prerequisites:
Shodan API key · Internet access · Python 3 with dependencies (shodan, requests)
nomisec
WORKING POC
4 stars
by twseptian · poc
https://github.com/twseptian/cve-2021-41773
This repository provides a working proof-of-concept for CVE-2021-41773, a path traversal vulnerability in Apache HTTP Server 2.4.49. It includes curl commands to exploit the vulnerability and retrieve sensitive files like /etc/passwd.
Classification
Working Poc 95%
Target:
Apache HTTP Server 2.4.49
No auth needed
Prerequisites:
Target running Apache HTTP Server 2.4.49 with CGI enabled
github
WRITEUP
3 stars
by HxDDD · poc
https://github.com/HxDDD/CVE-PoC/tree/main/Apache/(Path Traversal) CVE-2021-41773.md
This repository provides a detailed technical analysis of CVE-2021-41773, a path traversal vulnerability in Apache HTTP Server versions 2.4.49-2.4.50. It includes environment setup instructions, PoC demonstrations using curl, root cause analysis, and mitigation steps.
Classification
Writeup 90%
Target:
Apache HTTP Server 2.4.49-2.4.50
No auth needed
Prerequisites:
Apache HTTP Server 2.4.49-2.4.50 with specific configuration
nomisec
WORKING POC
3 stars
by superzerosec · remote
https://github.com/superzerosec/CVE-2021-41773
This PoC exploits CVE-2021-41773, a path traversal vulnerability in Apache HTTP Server 2.4.49, allowing arbitrary command execution via a crafted URL. It supports both direct command execution and reverse shell functionality.
Classification
Working Poc 95%
Target:
Apache HTTP Server 2.4.49
No auth needed
Prerequisites:
Target running Apache HTTP Server 2.4.49 with CGI enabled
nomisec
WORKING POC
3 stars
by jbovet · poc
https://github.com/jbovet/CVE-2021-41773
This repository provides a working proof-of-concept for CVE-2021-41773, a path traversal vulnerability in Apache HTTP Server 2.4.49. It includes Docker setup instructions and curl commands to exploit the flaw, demonstrating file disclosure outside the document root.
Classification
Working Poc 100%
Target:
Apache HTTP Server 2.4.49
No auth needed
Prerequisites:
Apache HTTP Server 2.4.49 with exposed CGI scripts or unprotected files outside the document root
nomisec
WORKING POC
3 stars
by habibiefaried · poc
https://github.com/habibiefaried/CVE-2021-41773-PoC
This PoC demonstrates CVE-2021-41773, a path traversal vulnerability in Apache 2.4.49, by using a Docker container to exploit the flaw and leak the contents of /etc/passwd via a maliciously crafted URL.
Classification
Working Poc 95%
Target:
Apache HTTP Server 2.4.49
No auth needed
Prerequisites:
Docker and Docker Compose installed · Apache 2.4.49 running in a container
nomisec
WORKING POC
2 stars
by RevShellXD · poc
https://github.com/RevShellXD/LFI-Destruction
This repository contains a modular Python-based LFI exploitation tool targeting CVE-2021-41773, with multiple modes for artifact fuzzing, log poisoning, reverse shell execution, and session hijacking. The tool supports both Linux and Windows targets with extensive wordlists and payload options.
Classification
Working Poc 95%
Target:
Apache HTTP Server 2.4.49 (CVE-2021-41773)
No auth needed
Prerequisites:
LFI vulnerability in target application · Ability to send HTTP requests to the target · Write access to log files for log poisoning
nomisec
WRITEUP
2 stars
by CyberQuestor-infosec · remote
https://github.com/CyberQuestor-infosec/CVE-2021-41773-Apache_2.4.49-Path-traversal-to-RCE
This repository provides a detailed writeup and demonstration of CVE-2021-41773, a path traversal vulnerability in Apache HTTP Server 2.4.49 that can lead to remote code execution when CGI is enabled. It includes exploit steps, references, and a reverse shell payload example.
Classification
Writeup 100%
Target:
Apache HTTP Server 2.4.49
No auth needed
Prerequisites:
Apache 2.4.49 with CGI enabled · Network access to the target
nomisec
WORKING POC
2 stars
by walnutsecurity · remote
https://github.com/walnutsecurity/cve-2021-41773
This repository contains a Python script that exploits CVE-2021-41773, a path traversal and remote code execution vulnerability in Apache HTTP Server 2.4.49 and 2.4.50. The script checks for both path traversal and RCE vulnerabilities by sending crafted HTTP requests to vulnerable endpoints.
Classification
Working Poc 95%
Attack Type
Rce | Info Leak
Target:
Apache HTTP Server 2.4.49, 2.4.50
No auth needed
Prerequisites:
CGI-BIN enabled for RCE · Alias directory configured for path traversal
nomisec
WORKING POC
2 stars
by Habib0x0 · remote
https://github.com/Habib0x0/CVE-2021-41773
This is a functional exploit for CVE-2021-41773, targeting Apache HTTP Server 2.4.49. It leverages path traversal and command injection via CGI to achieve remote code execution.
Classification
Working Poc 95%
Target:
Apache HTTP Server 2.4.49
No auth needed
Prerequisites:
mod_cgi enabled · misconfigured directory permissions (Require all granted)
nomisec
WORKING POC
2 stars
by iosifache · poc
https://github.com/iosifache/ApacheRCEEssay
This repository contains a working PoC for CVE-2021-41773, a path traversal and RCE vulnerability in Apache 2.4.49. The exploit uses a crafted curl command to execute arbitrary commands via a vulnerable CGI endpoint.
Classification
Working Poc 95%
Target:
Apache HTTP Server 2.4.49
No auth needed
Prerequisites:
Vulnerable Apache 2.4.49 server with CGI enabled · Network access to the target server
nomisec
WORKING POC
2 stars
by Chocapikk · remote
https://github.com/Chocapikk/CVE-2021-41773
This PoC exploits CVE-2021-41773, a path traversal and command injection vulnerability in Apache HTTP Server 2.4.49 and 2.4.50. It allows remote command execution via crafted requests to the CGI directory.
Classification
Working Poc 95%
Target:
Apache HTTP Server 2.4.49, 2.4.50
No auth needed
Prerequisites:
Target running vulnerable Apache version · Network access to the target
nomisec
WORKING POC
2 stars
by Soliux · poc
https://github.com/Soliux/CVE-2021-41773
This repository contains a Python script that exploits CVE-2021-41773, a path traversal and remote code execution vulnerability in Apache HTTP Server versions 2.4.49 and 2.4.50 with CGI enabled. The script reads a list of target IPs and attempts to execute a specified command on each vulnerable server.
Classification
Working Poc 95%
Target:
Apache HTTP Server 2.4.49, 2.4.50 (CGI enabled)
No auth needed
Prerequisites:
Apache HTTP Server 2.4.49 or 2.4.50 with CGI enabled · Network access to the target server
nomisec
WORKING POC
2 stars
by AssassinUKG · poc
https://github.com/AssassinUKG/CVE-2021-41773
This repository contains two Python scripts demonstrating CVE-2021-41773, a path traversal vulnerability in Apache HTTP Server 2.4.49. The first script checks for vulnerability by reading /etc/passwd, while the second achieves RCE by executing commands via bin/sh.
Classification
Working Poc 95%
Target:
Apache HTTP Server 2.4.49
No auth needed
Prerequisites:
Apache HTTP Server 2.4.49 with CGI enabled
nomisec
WRITEUP
2 stars
by lopqto · poc
https://github.com/lopqto/CVE-2021-41773_Honeypot
This repository is a writeup or documentation for a honeypot related to CVE-2021-41773, a path traversal vulnerability in Apache HTTP Server 2.4.49. It references an external blog post but contains no exploit code or technical details.
Classification
Writeup 90%
Target:
Apache HTTP Server 2.4.49
No auth needed
Prerequisites:
Apache HTTP Server 2.4.49
nomisec
SCANNER
2 stars
by jheeree · infoleak
https://github.com/jheeree/Simple-CVE-2021-41773-checker
This repository contains a bash script to check for CVE-2021-41773, a path traversal vulnerability in Apache HTTP Server 2.4.49. The script tests multiple hosts for the vulnerability by attempting to access '/etc/passwd' via a malformed URI path.
Classification
Scanner 90%
Target:
Apache HTTP Server 2.4.49
No auth needed
Prerequisites:
List of target IPs/hosts in a text file
nomisec
WORKING POC
2 stars
by 5gstudent · poc
https://github.com/5gstudent/cve-2021-41773-and-cve-2021-42013
This repository contains a Python script that tests for CVE-2021-41773, a path traversal vulnerability in Apache HTTP Server. The script sends GET requests with encoded payloads to retrieve /etc/passwd and checks for the presence of 'root' in the response.
Classification
Working Poc 90%
Target:
Apache HTTP Server 2.4.49
No auth needed
Prerequisites:
Target URL list in a text file
nomisec
WORKING POC
2 stars
by orangmuda · poc
https://github.com/orangmuda/CVE-2021-41773
This repository provides a Docker-based environment to test CVE-2021-41773, a path traversal and command injection vulnerability in Apache HTTP Server 2.4.49. It includes examples for local file disclosure and remote code execution via crafted HTTP requests.
Classification
Working Poc 100%
Attack Type
Rce | Info Leak
Target:
Apache HTTP Server 2.4.49
No auth needed
Prerequisites:
Docker environment · Apache HTTP Server 2.4.49 with CGI enabled
nomisec
WORKING POC
1 stars
by mightysai1997 · infoleak
https://github.com/mightysai1997/CVE-2021-41773S
This repository provides vulnerable Docker images for CVE-2021-41773, a path traversal vulnerability in Apache HTTP Server 2.4.49. It includes configurations for both file read and remote code execution (RCE) scenarios, with clear instructions for exploitation.
Classification
Working Poc 100%
Attack Type
Rce | Info Leak
Target:
Apache HTTP Server 2.4.49
No auth needed
Prerequisites:
Apache HTTP Server 2.4.49 with specific non-default configurations · Docker environment for testing
nomisec
WORKING POC
1 stars
by adrianmafandy · remote
https://github.com/adrianmafandy/CVE-2021-41773
This is a functional exploit for CVE-2021-41773, targeting Apache HTTP Server 2.4.49. It leverages path traversal to achieve remote code execution by sending a reverse shell payload.
Classification
Working Poc 95%
Target:
Apache HTTP Server 2.4.49
No auth needed
Prerequisites:
Target running Apache HTTP Server 2.4.49 · Network access to the target · Listener set up on attacker's machine
nomisec
SCANNER
1 stars
by charanvoonna · remote
https://github.com/charanvoonna/CVE-2021-41773
This is an NSE script for Nmap designed to detect the Apache HTTP Server Path Traversal vulnerability (CVE-2021-41773) by sending crafted HTTP requests and analyzing responses for file content leaks.
Classification
Scanner 90%
Target:
Apache HTTP Server (versions affected by CVE-2021-41773)
No auth needed
Prerequisites:
Nmap with NSE support · Target running Apache HTTP Server on an accessible port
nomisec
WORKING POC
1 stars
by Zyx2440 · remote
https://github.com/Zyx2440/Apache-HTTP-Server-2.4.50-RCE
This repository contains a Python script that exploits CVE-2021-41773, a path traversal and remote code execution vulnerability in Apache HTTP Server 2.4.50. The script checks for the vulnerable Apache version and attempts to exploit it by either reading sensitive files or executing a reverse shell if CGI is enabled.
Classification
Working Poc 95%
Target:
Apache HTTP Server 2.4.50
No auth needed
Prerequisites:
Apache HTTP Server 2.4.50 with CGI enabled for RCE · Network access to the target server
github
WORKING POC
1 stars
by vadimgggg · pythonpoc
https://github.com/vadimgggg/CVE-PoC/tree/main/CVE-2021-41773
This repository provides a functional PoC for CVE-2021-41773, a path traversal and RCE vulnerability in Apache HTTP Server 2.4.49. It includes a Dockerfile to set up a vulnerable environment and demonstrates exploitation via crafted curl commands.
Classification
Working Poc 95%
Target:
Apache HTTP Server 2.4.49
No auth needed
Prerequisites:
Docker · Apache HTTP Server 2.4.49
nomisec
WORKING POC
1 stars
by Iris288 · remote
https://github.com/Iris288/CVE-2021-41773
This exploit leverages a path traversal vulnerability in Apache HTTP Server 2.4.49-2.4.50 to execute arbitrary commands via a crafted URL. It provides an interactive shell by sending POST requests to a traversed path leading to /bin/sh.
Classification
Working Poc 95%
Target:
Apache HTTP Server 2.4.49-2.4.50
No auth needed
Prerequisites:
Target running vulnerable Apache version · Network access to the target
nomisec
WORKING POC
1 stars
by retrymp3 · remote
https://github.com/retrymp3/apache2.4.49VulnerableLabSetup
This repository contains two Python scripts demonstrating CVE-2021-41773, a path traversal and remote code execution vulnerability in Apache HTTP Server 2.4.49. The first script reads arbitrary files, while the second executes commands via a crafted POST request to a traversed path.
Classification
Working Poc 95%
Target:
Apache HTTP Server 2.4.49
No auth needed
Prerequisites:
Target running Apache HTTP Server 2.4.49 with CGI enabled
nomisec
WORKING POC
1 stars
by TheKernelPanic · remote
https://github.com/TheKernelPanic/exploit-apache2-cve-2021-41773
This exploit leverages a path traversal vulnerability in Apache 2.4.49 to achieve remote command execution via a crafted CGI request. The PoC provides an interactive shell by sending commands through the vulnerable endpoint.
Classification
Working Poc 95%
Target:
Apache HTTP Server 2.4.49
No auth needed
Prerequisites:
Apache 2.4.49 with CGI module enabled and misconfigured directory permissions
nomisec
WORKING POC
1 stars
by mightysai1997 · poc
https://github.com/mightysai1997/CVE-2021-41773m
This repository provides a working proof-of-concept for CVE-2021-41773, a path traversal vulnerability in Apache HTTP Server 2.4.49 that can lead to remote code execution (RCE) via CGI scripts. The PoC includes steps for setting up a vulnerable environment, exploiting the flaw to execute commands, and establishing a reverse shell.
Classification
Working Poc 100%
Target:
Apache HTTP Server 2.4.49
No auth needed
Prerequisites:
Apache HTTP Server 2.4.49 with CGI scripts enabled · Network access to the target server
nomisec
WORKING POC
1 stars
by kubota · poc
https://github.com/kubota/POC-CVE-2021-41773
This repository contains a Python-based PoC exploit for CVE-2021-41773, a path traversal vulnerability in Apache HTTP Server 2.4.49 and 2.4.50. The exploit demonstrates file reading and command execution via CGI scripts using URL-encoded path traversal sequences.
Classification
Working Poc 95%
Attack Type
Info Leak | Rce
Target:
Apache HTTP Server 2.4.49, 2.4.50
No auth needed
Prerequisites:
Apache HTTP Server 2.4.49 or 2.4.50 with CGI enabled for RCE
nomisec
WORKING POC
1 stars
by shellreaper · poc
https://github.com/shellreaper/CVE-2021-41773
This PoC exploits a path traversal vulnerability in Apache HTTP Server versions 2.4.49 and 2.4.50 with mod_cgi disabled. It uses a crafted URI to bypass path normalization and access files outside the web root directory.
Classification
Working Poc 95%
Target:
Apache HTTP Server 2.4.49, 2.4.50
No auth needed
Prerequisites:
Apache HTTP Server 2.4.49 or 2.4.50 with mod_cgi disabled · Network access to the target server
nomisec
WORKING POC
1 stars
by corelight · poc
https://github.com/corelight/CVE-2021-41773
This repository provides a Zeek package for detecting path traversal and RCE attempts targeting CVE-2021-41773 in Apache HTTP Server 2.4.49 and 2.4.50. It includes detection logic and example notices for triage.
Classification
Working Poc 90%
Target:
Apache HTTP Server 2.4.49, 2.4.50
No auth needed
Prerequisites:
Network traffic capture (PCAP) or live traffic monitoring · Zeek installed and configured
nomisec
WORKING POC
1 stars
by MazX0p · poc
https://github.com/MazX0p/CVE-2021-41773
This repository contains a functional proof-of-concept exploit for CVE-2021-41773, targeting Apache HTTP Server 2.4.49/2.4.50. The exploit leverages path traversal and command injection to achieve remote code execution (RCE) or read arbitrary files.
Classification
Working Poc 95%
Target:
Apache HTTP Server 2.4.49-2.4.50
No auth needed
Prerequisites:
gnome-terminal for reverse shell functionality · netcat for reverse shell listener
nomisec
WRITEUP
1 stars
by zerodaywolf · poc
https://github.com/zerodaywolf/CVE-2021-41773_42013
This repository provides a lab setup for testing CVE-2021-41773 and CVE-2021-42013, which are vulnerabilities in Apache HTTP Server. It includes Docker configurations to create a vulnerable environment for testing path traversal and potential RCE.
Classification
Writeup 90%
Target:
Apache HTTP Server
No auth needed
Prerequisites:
Docker · Git
nomisec
WRITEUP
1 stars
by ksanchezcld · poc
https://github.com/ksanchezcld/httpd-2.4.49
This repository contains the Apache HTTP Server 2.4.49 source code and documentation, including references to CVE-2021-41773 and CVE-2021-42013. No exploit code is present in the provided files.
Classification
Writeup 90%
Target:
Apache HTTP Server 2.4.49
No auth needed
nomisec
SCANNER
1 stars
by EagleTube · poc
https://github.com/EagleTube/CVE-2021-41773
This repository contains a scanner for CVE-2021-41773, a path traversal vulnerability in Apache 2.4.49. It checks for the presence of the vulnerability by attempting to read sensitive files like /etc/passwd.
Classification
Scanner 90%
Target:
Apache HTTP Server 2.4.49
No auth needed
Prerequisites:
Target running Apache 2.4.49 · Network access to the target
nomisec
WORKING POC
1 stars
by n3k00n3 · poc
https://github.com/n3k00n3/CVE-2021-41773
This Ruby script exploits CVE-2021-41773, a path traversal vulnerability in Apache HTTP Server 2.4.49 and 2.4.50, allowing arbitrary file read and potential RCE via crafted requests to cgi-bin endpoints.
Classification
Working Poc 90%
Target:
Apache HTTP Server 2.4.49, 2.4.50
No auth needed
Prerequisites:
Target running vulnerable Apache version · Access to cgi-bin endpoint
nomisec
WORKING POC
1 stars
by vinhjaxt · infoleak
https://github.com/vinhjaxt/CVE-2021-41773-exploit
This PoC exploits CVE-2021-41773, a path traversal vulnerability in Apache HTTP Server 2.4.49, by sending crafted requests to access sensitive files like /etc/passwd. It uses curl to test for vulnerability and checks for the presence of root user entries in the response.
Classification
Working Poc 95%
Target:
Apache HTTP Server 2.4.49
No auth needed
Prerequisites:
Target running Apache HTTP Server 2.4.49 · Network access to the target
nomisec
WORKING POC
1 stars
by PentesterGuruji · poc
https://github.com/PentesterGuruji/CVE-2021-41773
This repository provides a Docker-based lab environment to exploit CVE-2021-41773, a path traversal vulnerability in Apache HTTP Server 2.4.49. It includes PoC commands for both Local File Inclusion (LFI) and Remote Code Execution (RCE).
Classification
Working Poc 95%
Attack Type
Rce | Info Leak
Target:
Apache HTTP Server 2.4.49
No auth needed
Prerequisites:
Docker · Apache HTTP Server 2.4.49 with CGI enabled
nomisec
WORKING POC
1 stars
by r00tVen0m · poc
https://github.com/r00tVen0m/CVE-2021-41773
This repository contains a bash script that exploits CVE-2021-41773, a path traversal vulnerability in Apache HTTP Server 2.4.49. The script uses a crafted URL to access files outside the intended directory, demonstrating an information leak.
Classification
Working Poc 90%
Target:
Apache HTTP Server 2.4.49
No auth needed
Prerequisites:
Target running Apache HTTP Server 2.4.49 · Access to the target server via HTTP
nomisec
WORKING POC
1 stars
by masahiro331 · poc
https://github.com/masahiro331/CVE-2021-41773
This repository provides a working proof-of-concept for CVE-2021-41773, a path traversal vulnerability in Apache HTTP Server 2.4.49. The exploit leverages improper URL normalization to access files outside the intended directory, such as /etc/hosts.
Classification
Working Poc 90%
Target:
Apache HTTP Server 2.4.49
No auth needed
Prerequisites:
Apache HTTP Server 2.4.49 with Alias directive configured
nomisec
WORKING POC
by klmntbelgium · poc
https://github.com/klmntbelgium/cve-2021-41773-exploration
This repository contains a functional exploit for CVE-2021-41773, demonstrating path traversal and remote code execution in Apache 2.4.49 via a misconfigured `<Directory />` directive. The exploit uses a Dockerized vulnerable environment and a shell script to automate the attack chain.
Classification
Working Poc 100%
Target:
Apache HTTP Server 2.4.49
No auth needed
Prerequisites:
Docker installed · Apache 2.4.49 with misconfigured `<Directory />` directive
nomisec
WRITEUP
by JKIM72403 · poc
https://github.com/JKIM72403/CS4277-CVE-Path-Traversal-Apache-HTTP-Server
This repository contains a detailed technical analysis and project plan for reproducing CVE-2021-41773, a path traversal vulnerability in Apache HTTP Server 2.4.49. It explains the root cause (flawed ap_normalize_path() function) and outlines steps to exploit it using percent-encoded dot-dot-slash sequences.
Classification
Writeup 90%
Target:
Apache HTTP Server 2.4.49
No auth needed
Prerequisites:
Docker · Apache 2.4.49 · misconfigured server
nomisec
WORKING POC
by Kouf320 · poc
https://github.com/Kouf320/attacker-lab-cve-2017-5638-cve-2021-41773-paper
This repository contains a functional exploit for CVE-2021-41773, a path traversal and RCE vulnerability in Apache HTTP Server 2.4.49. The exploit script demonstrates the vulnerability by reading /etc/passwd and executing arbitrary commands via mod_cgi.
Classification
Working Poc 95%
Target:
Apache HTTP Server 2.4.49
No auth needed
Prerequisites:
Docker and Docker Compose v2 · Bash-compatible shell
gitlab
WORKING POC
by entee28 · poc
https://gitlab.com/entee28/cve-2021-41773
This repository provides vulnerable Docker images for CVE-2021-41773, a path traversal vulnerability in Apache HTTP Server 2.4.49. It includes functional PoC commands for both file read and remote code execution (RCE) scenarios, depending on the server configuration.
Classification
Working Poc 95%
Attack Type
Info Leak | Rce
Target:
Apache HTTP Server 2.4.49
No auth needed
Prerequisites:
Apache 2.4.49 with specific non-default configurations (CGI enabled for RCE)
nomisec
WORKING POC
by snapdowgg · remote
https://github.com/snapdowgg/CVE-2021-41773
This repository contains a functional exploit for CVE-2021-41773, a path traversal vulnerability in Apache HTTP Server 2.4.49. The exploit leverages a malformed URI to bypass path normalization and execute arbitrary commands via a shell script.
Classification
Working Poc 95%
Target:
Apache HTTP Server 2.4.49
No auth needed
Prerequisites:
Target running Apache HTTP Server 2.4.49 with CGI enabled
nomisec
WORKING POC
by sobanahmed6061 · remote
https://github.com/sobanahmed6061/CVE-2021-41773-RedTeam
The repository contains a functional Python PoC exploit for CVE-2021-41773, a path traversal and RCE vulnerability in Apache HTTP Server 2.4.49. The exploit includes both file read and remote command execution capabilities, along with a Docker lab setup for testing.
Classification
Working Poc 95%
Target:
Apache HTTP Server 2.4.49
No auth needed
Prerequisites:
Apache HTTP Server 2.4.49 with mod_cgi enabled
nomisec
WORKING POC
by abds059 · remote
https://github.com/abds059/APACHE-PATH-TRAVERSAL-RCE-CVE-2021-41773-
This repository contains a functional exploit for CVE-2021-41773, a path traversal vulnerability in Apache HTTP Server 2.4.49 that can lead to remote code execution (RCE). The exploit uses raw sockets to preserve URL-encoded path sequences, bypassing access controls and executing arbitrary commands via CGI.
Classification
Working Poc 100%
Target:
Apache HTTP Server 2.4.49
No auth needed
Prerequisites:
Apache 2.4.49 with CGI enabled · Docker for lab setup
nomisec
WORKING POC
by Areeba-Zehra-Jafri · remote
https://github.com/Areeba-Zehra-Jafri/CVE-2021-41773---Apache-Path-Traversal---RCE
The repository contains a functional Python exploit for CVE-2021-41773, demonstrating path traversal and remote code execution in Apache HTTP Server 2.4.49. The exploit sends crafted HTTP requests to execute arbitrary commands via a vulnerable CGI endpoint.
Classification
Working Poc 95%
Target:
Apache HTTP Server 2.4.49
No auth needed
Prerequisites:
Apache HTTP Server 2.4.49 with CGI enabled
nomisec
WORKING POC
by tsiddiquea · infoleak
https://github.com/tsiddiquea/cve-reproduction-lab
This repository contains a functional proof-of-concept for CVE-2021-41773, a path traversal vulnerability in Apache HTTP Server 2.4.49. It includes an exploit script that crafts malicious HTTP requests to access sensitive files outside the web root, along with vulnerable and patched server simulations for educational purposes.
Classification
Working Poc 95%
Target:
Apache HTTP Server 2.4.49
No auth needed
Prerequisites:
Python 3.x · requests library
nomisec
WORKING POC
by zubairahm3d · infoleak
https://github.com/zubairahm3d/apache-cve-2021-41773-lab
This repository contains a functional exploit for CVE-2021-41773, a path traversal vulnerability in Apache HTTP Server 2.4.49. It includes a Docker-based lab setup and a Python script to automate the exploitation of the flaw.
Classification
Working Poc 100%
Target:
Apache HTTP Server 2.4.49
No auth needed
Prerequisites:
Docker installed for lab setup · Network access to target Apache server
nomisec
WORKING POC
by Nanxsec · poc
https://github.com/Nanxsec/exploitApache
This repository contains a functional exploit for CVE-2021-41773, a path traversal vulnerability in Apache HTTP Server. The exploit uses a crafted URL to traverse directories and execute a reverse shell via a bash command.
Classification
Working Poc 95%
Target:
Apache HTTP Server 2.4.49
No auth needed
Prerequisites:
Target with vulnerable Apache HTTP Server · Network access to the target · Attacker-controlled IP and port for reverse shell
gitlab
WORKING POC
by sebast331-poc · poc
https://gitlab.com/sebast331-poc/cve-2021-41773
This repository provides a functional Docker-based proof-of-concept for CVE-2021-41773, a path traversal vulnerability in Apache HTTP Server 2.4.49. The exploit demonstrates unauthorized access to system files (e.g., /etc/passwd) via crafted HTTP requests.
Classification
Working Poc 95%
Target:
Apache HTTP Server 2.4.49
No auth needed
Prerequisites:
Docker environment · Apache HTTP Server 2.4.49
gitlab
STUB
by ahmad4fifz · poc
https://gitlab.com/ahmad4fifz/docker-cve-2021-41773
The repository contains only a Dockerfile and a minimal README with no actual exploit code or technical details about CVE-2021-41773. It lacks any functional PoC or analysis.
Target:
unknown
No auth needed
Prerequisites:
none
gitlab
WORKING POC
by vulnerability-writeup · poc
https://gitlab.com/vulnerability-writeup/cve-2021-41773
This repository contains a functional Python exploit for CVE-2021-41773, a path traversal and command injection vulnerability in Apache HTTP Server 2.4.49/2.4.50. The exploit leverages malformed CGI paths to achieve remote code execution (RCE) on vulnerable systems.
Classification
Working Poc 95%
Target:
Apache HTTP Server 2.4.49/2.4.50 (CGI enabled)
No auth needed
Prerequisites:
CGI enabled on the target Apache server · Network access to the target
gitlab
WORKING POC
by amstal93 · poc
https://gitlab.com/amstal93/cve-2021-41773
This repository contains a functional Python exploit for CVE-2021-41773, a path traversal and command injection vulnerability in Apache HTTP Server 2.4.49/2.4.50. The exploit leverages malformed CGI paths to achieve remote code execution (RCE) on vulnerable systems.
Classification
Working Poc 95%
Target:
Apache HTTP Server 2.4.49/2.4.50 (CGI enabled)
No auth needed
Prerequisites:
CGI enabled on the target Apache server · Network access to the target server
gitlab
WORKING POC
by checkscale-gitlab · poc
https://gitlab.com/checkscale-gitlab/cve-2021-41773
This repository contains a functional Python exploit for CVE-2021-41773, a path traversal and RCE vulnerability in Apache HTTP Server 2.4.49/2.4.50. The exploit leverages malformed CGI paths to execute arbitrary commands via a pseudo-interactive shell.
Classification
Working Poc 95%
Target:
Apache HTTP Server 2.4.49/2.4.50 (CGI enabled)
No auth needed
Prerequisites:
CGI enabled on target Apache server · Network access to target
gitlab
WORKING POC
by bc-scale · remote
https://gitlab.com/bc-scale/cve-2021-41773
This repository contains a functional Python exploit for CVE-2021-41773, a path traversal and RCE vulnerability in Apache HTTP Server 2.4.49/2.4.50. The exploit leverages malformed CGI paths to execute arbitrary commands via a pseudo-interactive shell.
Classification
Working Poc 95%
Target:
Apache HTTP Server 2.4.49/2.4.50 (CGI enabled)
No auth needed
Prerequisites:
CGI enabled on target Apache server · Network access to target
nomisec
WORKING POC
by ISabbiI · remote
https://github.com/ISabbiI/PoC-Apache-CVE-2021-41773-Infrastructure-LAB
This repository contains a functional PoC exploit for CVE-2021-41773, a path traversal and RCE vulnerability in Apache HTTP Server 2.4.49. The exploit leverages improper URL path normalization to traverse directories and execute commands via mod_cgi.
Classification
Working Poc 95%
Target:
Apache HTTP Server 2.4.49
No auth needed
Prerequisites:
mod_cgi enabled · Require all granted on root directory
nomisec
WORKING POC
by dserdyk3-arch · poc
https://github.com/dserdyk3-arch/Serdyuk-DO-homework-CVE-2021-41773
This repository contains a functional PoC for CVE-2021-41773, a path traversal vulnerability in Apache HTTP Server 2.4.49. The script tests multiple payloads to read arbitrary files (e.g., /etc/passwd) and includes a mock vulnerable server for testing.
Classification
Working Poc 95%
Target:
Apache HTTP Server 2.4.49
No auth needed
Prerequisites:
Target running Apache HTTP Server 2.4.49 · Access to CGI or icons directory
nomisec
SCANNER
by sudo0xksh · poc
https://github.com/sudo0xksh/cve-2021-41773-checker
This repository contains a Python-based CLI tool that checks for CVE-2021-41773, a path traversal vulnerability in Apache HTTP Server 2.4.49. It verifies the server version and attempts to confirm the vulnerability by probing for `/etc/passwd` disclosure.
Classification
Scanner 95%
Target:
Apache HTTP Server 2.4.49
No auth needed
Prerequisites:
Target running Apache HTTP Server 2.4.49 · Network access to the target server
nomisec
WRITEUP
by ChanaPCN · poc
https://github.com/ChanaPCN/CVE-2021-41773-Analysis
This repository contains a technical analysis and reproduction lab for CVE-2021-41773, a path traversal and RCE vulnerability in Apache HTTP Server 2.4.49. It does not include exploit code but provides documentation for understanding the vulnerability.
Classification
Writeup 90%
Target:
Apache HTTP Server 2.4.49
No auth needed
Prerequisites:
Apache HTTP Server 2.4.49 installed · Network access to the target server
nomisec
WORKING POC
by mightysai1997 · poc
https://github.com/mightysai1997/CVE-2021-41773h
This repository provides a working proof-of-concept for CVE-2021-41773, a path traversal vulnerability in Apache HTTP Server 2.4.49. It includes Docker setup instructions and curl commands to exploit the flaw, demonstrating file disclosure outside the document root.
Classification
Working Poc 100%
Target:
Apache HTTP Server 2.4.49
No auth needed
Prerequisites:
Apache HTTP Server 2.4.49 with exposed CGI scripts or unprotected files outside the document root
nomisec
WORKING POC
by mightysai1997 · infoleak
https://github.com/mightysai1997/CVE-2021-41773-PoC
This PoC demonstrates CVE-2021-41773, a path traversal vulnerability in Apache 2.4.49, by exploiting a flaw in URL normalization to access the /etc/passwd file. The script uses Docker to set up a vulnerable environment and curls a maliciously crafted URL to trigger the vulnerability.
Classification
Working Poc 95%
Target:
Apache HTTP Server 2.4.49
No auth needed
Prerequisites:
Docker and docker-compose installed · Apache 2.4.49 running in a container
nomisec
WORKING POC
by mightysai1997 · remote
https://github.com/mightysai1997/CVE-2021-41773-i-
This repository provides a working proof-of-concept for CVE-2021-41773, a path traversal vulnerability in Apache HTTP Server 2.4.49. It includes a Docker setup to replicate the vulnerable environment and demonstrates the exploit via a crafted HTTP request to access sensitive files like /etc/passwd.
Classification
Working Poc 100%
Target:
Apache HTTP Server 2.4.49
No auth needed
Prerequisites:
Docker installed · Apache HTTP Server 2.4.49 configured with vulnerable settings
nomisec
WORKING POC
by dileepdkumar · remote
https://github.com/dileepdkumar/LayarKacaSiber-CVE-2021-41773
This repository contains a working PoC for CVE-2021-41773, a path traversal and RCE vulnerability in Apache HTTP Server 2.4.49. The exploit script uses a crafted curl command to traverse directories and execute commands on vulnerable servers.
Classification
Working Poc 95%
Target:
Apache HTTP Server 2.4.49
No auth needed
Prerequisites:
Vulnerable Apache HTTP Server 2.4.49 · Network access to the target server
nomisec
SCANNER
by faizdotid · infoleak
https://github.com/faizdotid/CVE-2021-41773
This repository contains a Python-based scanner for CVE-2021-41773, a path traversal vulnerability in Apache HTTP Server. It checks for the presence of /etc/passwd via CGI-BIN paths using various encoded payloads.
Classification
Scanner 95%
Target:
Apache HTTP Server 2.4.49
No auth needed
Prerequisites:
List of target URLs
nomisec
WORKING POC
by gunzf0x · infoleak
https://github.com/gunzf0x/CVE-2021-41773
This is a functional Python exploit for CVE-2021-41773, a path traversal and command injection vulnerability in Apache HTTP Server 2.4.49. It crafts a malicious request to execute arbitrary commands via a traversal sequence in the CGI directory.
Classification
Working Poc 100%
Target:
Apache HTTP Server 2.4.49
No auth needed
Prerequisites:
Target running Apache 2.4.49 with CGI enabled · Network access to the target server
nomisec
WRITEUP
by MuhammadHuzaifaAsif · poc
https://github.com/MuhammadHuzaifaAsif/security-lab
This repository provides a detailed technical analysis of CVE-2021-41773, including CVSS breakdown, impact assessment, and mitigation steps. It does not contain exploit code but offers in-depth documentation of the vulnerability.
Classification
Writeup 100%
Target:
Apache HTTP Server 2.4.49
No auth needed
Prerequisites:
Apache HTTP Server 2.4.49 installed
nomisec
WRITEUP
by hackedrishi · remote
https://github.com/hackedrishi/CTF_WRITEUPS-TryHackMe-CVE-2021-41773-
This is a detailed writeup explaining CVE-2021-41773 and CVE-2021-42013, which are path traversal vulnerabilities in Apache HTTP Server versions 2.4.49 and 2.4.50. It includes background information, theoretical explanations, and setup instructions for a vulnerable Docker environment.
Classification
Writeup 100%
Target:
Apache HTTP Server 2.4.49, 2.4.50
No auth needed
Prerequisites:
Apache HTTP Server 2.4.49 or 2.4.50 · Misconfiguration allowing access to files outside document root · Optional: CGI scripts enabled for RCE
nomisec
WORKING POC
by mah4nzfr · remote
https://github.com/mah4nzfr/CVE-2021-41773
This is a functional exploit for CVE-2021-41773, a path traversal and RCE vulnerability in Apache 2.4.49. It leverages a malformed URI path to execute arbitrary commands via a reverse shell.
Classification
Working Poc 95%
Target:
Apache HTTP Server 2.4.49
No auth needed
Prerequisites:
Target running Apache 2.4.49 with CGI enabled · Network access to the target · Listener setup for reverse shell
nomisec
WORKING POC
by r0otk3r · remote
https://github.com/r0otk3r/CVE-2021-41773
This repository contains a functional exploit for CVE-2021-41773 and CVE-2021-42013, targeting Apache HTTP Server 2.4.49 and 2.4.50. It includes both RCE and LFI capabilities via path traversal vulnerabilities.
Classification
Working Poc 95%
Attack Type
Rce | Info Leak
Target:
Apache HTTP Server 2.4.49, 2.4.50
No auth needed
Prerequisites:
CGI enabled for RCE · Apache 2.4.49 or 2.4.50
nomisec
WORKING POC
by blu3ming · infoleak
https://github.com/blu3ming/PoC-CVE-2021-41773
This is a Python-based exploit for CVE-2021-41773, a path traversal vulnerability in Apache HTTP Server 2.4.49. It leverages URL-encoded path traversal sequences to bypass Apache's path validation and read arbitrary files from the server.
Classification
Working Poc 95%
Target:
Apache HTTP Server 2.4.49
No auth needed
Prerequisites:
Target running Apache HTTP Server 2.4.49 · Network access to the target server
nomisec
SCANNER
by psibot · poc
https://github.com/psibot/apache-vulnerable
This repository provides Nuclei templates to scan for vulnerable Apache versions (2.4.49-2.4.50) and path traversal vulnerabilities (CVE-2021-41773 and CVE-2021-42013). It includes detection and exploitation templates for automated scanning.
Classification
Scanner 90%
Target:
Apache HTTP Server 2.4.49 and 2.4.50
No auth needed
Prerequisites:
Nuclei installed · Target URLs or host list
nomisec
WORKING POC
by AzkOsDev · poc
https://github.com/AzkOsDev/CVE-2021-41773
This PoC exploits CVE-2021-41773, a path traversal vulnerability in Apache HTTP Server 2.4.49, allowing remote code execution via crafted curl commands when mod_cgi is enabled. The script provides an interactive shell to execute arbitrary commands on the target system.
Classification
Working Poc 95%
Target:
Apache HTTP Server 2.4.49
No auth needed
Prerequisites:
mod_cgi enabled on the target Apache server · Network access to the vulnerable server
nomisec
WORKING POC
by JIYUN02 · remote
https://github.com/JIYUN02/cve-2021-41773
This repository provides a working proof-of-concept for CVE-2021-41773, a path traversal vulnerability in Apache HTTP Server 2.4.49. It includes a Docker-based environment setup and a curl command to exploit the vulnerability by accessing sensitive files like /etc/passwd.
Classification
Working Poc 95%
Target:
Apache HTTP Server 2.4.49
No auth needed
Prerequisites:
Docker · Apache HTTP Server 2.4.49 with 'Require all granted' configuration
nomisec
WORKING POC
by khaidtraivch · remote
https://github.com/khaidtraivch/CVE-2021-41773-Apache-2.4.49-
This repository contains a working PoC for CVE-2021-41773, demonstrating path traversal and remote code execution (RCE) via a reverse shell on Apache 2.4.49. The exploit leverages a path traversal vulnerability in the CGI module to read sensitive files and execute arbitrary commands.
Classification
Working Poc 95%
Attack Type
Rce | Info Leak
Target:
Apache HTTP Server 2.4.49
No auth needed
Prerequisites:
Target running Apache 2.4.49 with CGI enabled · Network access to the target server
nomisec
WORKING POC
by luongchivi · remote
https://github.com/luongchivi/Preproduce-CVE-2021-41773
This repository provides a working proof-of-concept for CVE-2021-41773, a path traversal vulnerability in Apache HTTP Server 2.4.49. It includes Docker setup for testing and curl commands to exploit the vulnerability, demonstrating file disclosure via path traversal.
Classification
Working Poc 100%
Target:
Apache HTTP Server 2.4.49
No auth needed
Prerequisites:
Apache HTTP Server 2.4.49 running with vulnerable configuration
nomisec
WRITEUP
by ashique-thaha · remote
https://github.com/ashique-thaha/CVE-2021-41773-POC
This repository provides a detailed writeup and lab setup instructions for CVE-2021-41773, a path traversal vulnerability in Apache HTTP Server 2.4.49 and 2.4.50. It explains the root cause, exploitation method, and includes steps to replicate the vulnerability in a controlled environment.
Classification
Writeup 100%
Target:
Apache HTTP Server 2.4.49 and 2.4.50
No auth needed
Prerequisites:
Apache HTTP Server 2.4.49 or 2.4.50 with misconfigured 'Require all granted' directive
nomisec
WORKING POC
by javaamo · remote
https://github.com/javaamo/CVE-2021-41773
This is a corrected and functional exploit for CVE-2021-41773, a path traversal and RCE vulnerability in Apache HTTP Server 2.4.49. The script uses a path traversal technique via malformed URL encoding to access arbitrary files or execute commands on vulnerable systems.
Classification
Working Poc 95%
Target:
Apache HTTP Server 2.4.49
No auth needed
Prerequisites:
A vulnerable Apache HTTP Server 2.4.49 instance · Network access to the target server
nomisec
WRITEUP
by Vanshuk-Bhagat · poc
https://github.com/Vanshuk-Bhagat/Apache-HTTP-Server-Vulnerabilities-CVE-2021-41773-and-CVE-2021-42013
This repository contains a writeup documenting the reconnaissance and exploitation process for Apache HTTP Server vulnerabilities CVE-2021-41773 and CVE-2021-42013, focusing on Path Traversal and RCE. It details the methodology used, including tools like Nmap and Metasploit, but concludes that the vulnerabilities were not exploitable in the tested environment.
Classification
Writeup 90%
Target:
Apache HTTP Server
No auth needed
Prerequisites:
Access to the target network · Apache HTTP Server running a vulnerable version
nomisec
WORKING POC
by tiemio · remote
https://github.com/tiemio/SSH-key-and-RCE-PoC-for-CVE-2021-41773
This Go-based PoC exploits CVE-2021-41773, a path traversal vulnerability in Apache HTTP Server 2.4.49/2.4.50, to achieve LFI and RCE. It includes functionality for SSH key brute-forcing and remote command execution via crafted HTTP requests.
Classification
Working Poc 95%
Target:
Apache HTTP Server 2.4.49, 2.4.50
No auth needed
Prerequisites:
Vulnerable Apache HTTP Server version · Network access to the target
nomisec
WORKING POC
by FakesiteSecurity · remote
https://github.com/FakesiteSecurity/CVE-2021-41773
This repository contains multiple Python scripts for exploiting CVE-2021-41773, a path traversal vulnerability in Apache HTTP Server. The scripts include a mass scanner, an RCE exploit, and a manual command execution tool.
Classification
Working Poc 95%
Target:
Apache HTTP Server 2.4.49
No auth needed
Prerequisites:
Target running vulnerable Apache HTTP Server version · Network access to the target
nomisec
WORKING POC
by redspy-sec · remote
https://github.com/redspy-sec/CVE-2021-41773
This exploit leverages a path traversal vulnerability in Apache HTTP Server 2.4.49 to achieve remote code execution (RCE) by accessing the `/bin/sh` binary through malformed URL paths. It provides an interactive shell for executing commands on the target system.
Classification
Working Poc 95%
Target:
Apache HTTP Server 2.4.49
No auth needed
Prerequisites:
Target running Apache HTTP Server 2.4.49 with CGI enabled
nomisec
WORKING POC
by skentagon · remote
https://github.com/skentagon/CVE-2021-41773
This repository contains two Python scripts demonstrating CVE-2021-41773, a path traversal vulnerability in Apache HTTP Server 2.4.49. One script exploits the vulnerability to read arbitrary files (e.g., /etc/passwd), while the other achieves RCE by accessing /bin/sh via the traversal.
Classification
Working Poc 95%
Attack Type
Rce | Info Leak
Target:
Apache HTTP Server 2.4.49
No auth needed
Prerequisites:
Apache HTTP Server 2.4.49 with CGI enabled (for RCE) · No 'Require all denied' configuration in place
nomisec
WRITEUP
by jkska23 · poc
https://github.com/jkska23/Additive-Vulnerability-Analysis-CVE-2021-41773
This repository contains a README file describing an analysis of CVE-2021-41773, a path traversal vulnerability in Apache HTTP Server 2.4.49 that can lead to remote code execution. No exploit code is present.
Classification
Writeup 90%
Target:
Apache HTTP Server 2.4.49
No auth needed
Prerequisites:
Apache HTTP Server 2.4.49 with vulnerable configuration
nomisec
WORKING POC
by 0xc4t · remote
https://github.com/0xc4t/CVE-2021-41773
This repository provides a working PoC for CVE-2021-41773, a path traversal vulnerability in Apache HTTP Server 2.4.49. It includes commands to exploit both RCE and LFI via malformed URI paths.
Classification
Working Poc 95%
Attack Type
Rce | Info Leak
Target:
Apache HTTP Server 2.4.49
No auth needed
Prerequisites:
Apache HTTP Server 2.4.49 with CGI enabled
nomisec
SCANNER
by Maybe4a6f7365 · infoleak
https://github.com/Maybe4a6f7365/CVE-2021-41773
This script checks if an Apache server is vulnerable to CVE-2021-41773 by attempting to read arbitrary files via a path traversal exploit. It sends a crafted HTTP request to the target server and checks the response for success or failure.
Classification
Scanner 90%
Target:
Apache HTTP Server 2.4.49
No auth needed
Prerequisites:
Target server running Apache HTTP Server 2.4.49 · Network access to the target server
nomisec
WORKING POC
by 0xGabe · remote
https://github.com/0xGabe/Apache-CVEs
This repository contains Python-based exploit scripts for CVE-2021-41773 and CVE-2021-42013, targeting path traversal and remote command execution vulnerabilities in Apache HTTP Server versions 2.4.49 and 2.4.50, respectively. The scripts leverage URL-encoded path traversal techniques to access restricted files or execute arbitrary commands via the `/cgi-bin/` endpoint.
Classification
Working Poc 95%
Attack Type
Rce | Info Leak
Target:
Apache HTTP Server 2.4.49 (CVE-2021-41773), Apache HTTP Server 2.4.50 (CVE-2021-42013)
No auth needed
Prerequisites:
Target must be running a vulnerable version of Apache HTTP Server · Network access to the target's web server · CGI module must be enabled on the target
nomisec
WORKING POC
by MatanelGordon · infoleak
https://github.com/MatanelGordon/docker-cve-2021-41773
This repository demonstrates CVE-2021-41773, a path traversal vulnerability in Apache HTTP Server 2.4.49. The exploit script uses a crafted URL to access sensitive files (e.g., /etc/passwd) by bypassing path normalization.
Classification
Working Poc 95%
Target:
Apache HTTP Server 2.4.49
No auth needed
Prerequisites:
Docker installed · Apache HTTP Server 2.4.49 running in a container
nomisec
WORKING POC
by 12345qwert123456 · remote
https://github.com/12345qwert123456/CVE-2021-41773
This repository provides a vulnerable Dockerized Apache 2.4.49 service and a PoC exploit for CVE-2021-41773, a path traversal vulnerability. The exploit demonstrates unauthorized file access via a crafted URL.
Classification
Working Poc 95%
Target:
Apache HTTP Server 2.4.49
No auth needed
Prerequisites:
Vulnerable Apache 2.4.49 instance · Network access to the target
nomisec
WORKING POC
by mightysai1997 · infoleak
https://github.com/mightysai1997/CVE-2021-41773.git1
This repository contains a Python script that tests for CVE-2021-41773, a path traversal vulnerability in Apache HTTP Server. The script sends HTTP requests to a list of URLs with a crafted payload to check for the presence of the vulnerability by attempting to read the /etc/passwd file.
Classification
Working Poc 95%
Target:
Apache HTTP Server 2.4.49
No auth needed
Prerequisites:
List of target URLs
nomisec
WORKING POC
by mightysai1997 · remote
https://github.com/mightysai1997/CVE-2021-41773-L-
This repository provides a working proof-of-concept for CVE-2021-41773, a path traversal vulnerability in Apache HTTP Server 2.4.49 that can lead to remote code execution (RCE) via CGI scripts. The PoC includes steps to exploit the vulnerability, achieve command execution, and establish a reverse shell.
Classification
Working Poc 100%
Target:
Apache HTTP Server 2.4.49
No auth needed
Prerequisites:
Apache HTTP Server 2.4.49 with CGI scripts enabled · Network access to the target server
nomisec
WORKING POC
by mightysai1997 · remote
https://github.com/mightysai1997/cve-2021-41773-v-
This repository contains a functional exploit for CVE-2021-41773, targeting Apache HTTP Server 2.4.49/2.4.50 with CGI enabled. The exploit leverages path traversal and command injection to achieve remote code execution (RCE) via crafted payloads.
Classification
Working Poc 95%
Target:
Apache HTTP Server 2.4.49/2.4.50
No auth needed
Prerequisites:
CGI enabled on the target Apache server · Network access to the target
nomisec
WORKING POC
by mightysai1997 · remote
https://github.com/mightysai1997/cve-2021-41773
This repository contains a functional exploit for CVE-2021-41773, targeting Apache HTTP Server 2.4.49/2.4.50 with CGI enabled. The exploit leverages path traversal to achieve remote code execution via crafted URLs.
Classification
Working Poc 95%
Target:
Apache HTTP Server 2.4.49/2.4.50
No auth needed
Prerequisites:
CGI enabled on the target Apache server · Network access to the target
nomisec
WRITEUP
by EkamSinghWalia · poc
https://github.com/EkamSinghWalia/Mitigation-Apache-CVE-2021-41773-
This repository provides mitigation scripts for CVE-2021-41773, a path traversal and file disclosure vulnerability in Apache HTTP Server. It includes two scripts: one for updating the system and Apache, and another for modifying the Apache configuration to restrict access.
Classification
Writeup 100%
Target:
Apache HTTP Server 2.4.49
No auth needed
Prerequisites:
Access to the target system with sufficient privileges to modify Apache configuration or install updates
nomisec
WORKING POC
by pwn3z · infoleak
https://github.com/pwn3z/CVE-2021-41773-Apache-RCE
This exploit leverages a path traversal vulnerability in Apache HTTP Server 2.4.49 to access files outside the configured directories, potentially leading to remote code execution if CGI scripts are enabled. The script checks for the presence of `/bin/bash` in `/etc/passwd` to confirm vulnerability.
Classification
Working Poc 90%
Target:
Apache HTTP Server 2.4.49
No auth needed
Prerequisites:
Apache HTTP Server 2.4.49 with CGI enabled · Accessible `/etc/passwd` or similar sensitive files
nomisec
WORKING POC
by ranggaggngntt · infoleak
https://github.com/ranggaggngntt/CVE-2021-41773
This repository contains a Python script that exploits CVE-2021-41773, a path traversal vulnerability in Apache HTTP Server 2.4.49. The script can check for vulnerable servers and attempt to read sensitive files like /etc/passwd.
Classification
Working Poc 95%
Target:
Apache HTTP Server 2.4.49
No auth needed
Prerequisites:
Target running Apache HTTP Server 2.4.49 · Network access to the target server
nomisec
WORKING POC
by bernardas · poc
https://github.com/bernardas/netsec-polygon
This repository contains a proof-of-concept for CVE-2021-41773, a path traversal vulnerability in Apache HTTP Server. The exploit demonstrates directory traversal via crafted URIs to access files outside the intended document root.
Classification
Working Poc 90%
Target:
Apache HTTP Server 2.4.49
No auth needed
Prerequisites:
Apache HTTP Server 2.4.49 with default configuration
nomisec
SCANNER
by anldori · remote
https://github.com/anldori/CVE-2021-41773-Scanner
This repository contains a Shodan-based scanner for CVE-2021-41773, a path traversal and RCE vulnerability in Apache HTTP Server 2.4.49 and 2.4.50. It uses multithreading to scan for vulnerable hosts and includes a basic exploit function to test for RCE.
Classification
Scanner 90%
Target:
Apache HTTP Server 2.4.49, 2.4.50
No auth needed
Prerequisites:
Shodan API key · Network access to target hosts
nomisec
WORKING POC
by zer0qs · infoleak
https://github.com/zer0qs/CVE-2021-41773
This repository contains a Python exploit for CVE-2021-41773, a path traversal vulnerability in Apache HTTP Server 2.4.49. The exploit checks for vulnerability and allows remote command execution via a crafted payload targeting the CGI module.
Classification
Working Poc 95%
Target:
Apache HTTP Server 2.4.49
No auth needed
Prerequisites:
Target running Apache HTTP Server 2.4.49 with CGI enabled
nomisec
WORKING POC
by vuongnv3389-sec · infoleak
https://github.com/vuongnv3389-sec/cve-2021-41773
This repository provides a working PoC for CVE-2021-41773, a path traversal vulnerability in Apache HTTP Server 2.4.49 that allows remote command execution (RCE) via a maliciously crafted request. The exploit leverages a misconfiguration in httpd.conf to traverse directories and execute commands.
Classification
Working Poc 90%
Target:
Apache HTTP Server 2.4.49
No auth needed
Prerequisites:
Apache HTTP Server 2.4.49 with vulnerable configuration
nomisec
WORKING POC
by DoTuan1 · infoleak
https://github.com/DoTuan1/Reserch-CVE-2021-41773
This PoC exploits CVE-2021-41773, a path traversal vulnerability in Apache HTTP Server 2.4.49, allowing unauthorized access to files and potential RCE via CGI script execution. The exploit sends crafted requests to retrieve /etc/passwd or execute commands via /bin/sh.
Classification
Working Poc 95%
Attack Type
Rce | Info Leak
Target:
Apache HTTP Server 2.4.49
No auth needed
Prerequisites:
Apache 2.4.49 with CGI enabled · Network access to the target server
nomisec
WORKING POC
by puckiestyle · remote
https://github.com/puckiestyle/CVE-2021-41773
This repository contains two Python scripts demonstrating CVE-2021-41773, a path traversal vulnerability in Apache HTTP Server 2.4.49. The first script checks for vulnerability by reading /etc/passwd, while the second achieves RCE by executing commands via /bin/sh.
Classification
Working Poc 95%
Target:
Apache HTTP Server 2.4.49
No auth needed
Prerequisites:
Apache HTTP Server 2.4.49 with CGI enabled
nomisec
WORKING POC
by i6c · poc
https://github.com/i6c/MASS_CVE-2021-41773
This repository contains multiple Python scripts for exploiting CVE-2021-41773, a path traversal vulnerability in Apache HTTP Server. The scripts include a mass scanner, an RCE exploit, and a manual command execution tool.
Classification
Working Poc 95%
Target:
Apache HTTP Server 2.4.49
No auth needed
Prerequisites:
Target running vulnerable Apache HTTP Server · Network access to the target
nomisec
WORKING POC
by twseptian · poc
https://github.com/twseptian/cve-2021-41773-docker-lab
This repository provides a Docker-based lab environment to demonstrate CVE-2021-41773, a path traversal vulnerability in Apache HTTP Server. It includes PoC commands for file disclosure and mentions RCE potential when CGI is enabled.
Classification
Working Poc 95%
Target:
Apache HTTP Server 2.4.49
No auth needed
Prerequisites:
Apache HTTP Server 2.4.49 with default configuration or CGI enabled
nomisec
WORKING POC
by xMohamed0 · poc
https://github.com/xMohamed0/CVE-2021-41773
This repository contains a functional proof-of-concept exploit for CVE-2021-41773, a path traversal and remote code execution vulnerability in Apache HTTP Server 2.4.49-50. The script provides options for either executing a reverse shell or reading arbitrary files via path traversal.
Classification
Working Poc 95%
Target:
Apache HTTP Server 2.4.49-50
No auth needed
Prerequisites:
Target running vulnerable Apache version · Network access to the target
nomisec
WORKING POC
by pirenga · poc
https://github.com/pirenga/CVE-2021-41773
This is a functional exploit for CVE-2021-41773, targeting Apache HTTP Server 2.4.49/2.4.50 with CGI enabled. It leverages path traversal and command injection to achieve remote code execution via crafted payloads.
Classification
Working Poc 95%
Target:
Apache HTTP Server 2.4.49/2.4.50 (CGI enabled)
No auth needed
Prerequisites:
Apache HTTP Server 2.4.49/2.4.50 with CGI enabled · Network access to the target server
nomisec
STUB
by wolf1892 · poc
https://github.com/wolf1892/CVE-2021-41773
The repository contains only a README.md file with minimal information about setting up a vulnerable environment for CVE-2021-41773, but no actual exploit code or technical details.
Target:
Apache HTTP Server 2.4.49
No auth needed
Prerequisites:
Apache HTTP Server 2.4.49 installed
nomisec
SCANNER
by vida003 · poc
https://github.com/vida003/Scanner-CVE-2021-41773
This repository contains a Go-based scanner for CVE-2021-41773, a path traversal vulnerability in Apache HTTP Server 2.4.49. It checks a list of hosts for vulnerability by sending a crafted HTTP request to access '/etc/passwd' and logs vulnerable hosts to a file.
Classification
Scanner 95%
Target:
Apache HTTP Server 2.4.49
No auth needed
Prerequisites:
List of target hosts in a text file
nomisec
WORKING POC
by TheLastVvV · infoleak
https://github.com/TheLastVvV/CVE-2021-41773
This PoC exploits CVE-2021-41773, a path traversal vulnerability in Apache 2.4.49 with CGI enabled, allowing arbitrary file reads via crafted requests. The script uses curl to send a malicious request that bypasses path normalization to execute a bash command and read a specified file.
Classification
Working Poc 95%
Target:
Apache HTTP Server 2.4.49
No auth needed
Prerequisites:
Apache 2.4.49 with CGI enabled · Network access to the target server
nomisec
WORKING POC
by LayarKacaSiber · remote
https://github.com/LayarKacaSiber/CVE-2021-41773
This repository contains a working exploit for CVE-2021-41773, a path traversal and RCE vulnerability in Apache HTTP Server 2.4.49. The exploit script uses a crafted curl command to traverse directories and execute arbitrary commands on the target system.
Classification
Working Poc 95%
Target:
Apache HTTP Server 2.4.49
No auth needed
Prerequisites:
Target running Apache HTTP Server 2.4.49 · Network access to the target
nomisec
STUB
by BabyTeam1024 · poc
https://github.com/BabyTeam1024/CVE-2021-41773
The repository contains only a README.md file with a CVE identifier and no exploit code or technical details. It appears to be a placeholder or incomplete submission.
Target:
unknown
No auth needed
nomisec
WRITEUP
by shiomiyan · poc
https://github.com/shiomiyan/CVE-2021-41773
This repository provides documentation and Docker setup instructions for testing CVE-2021-41773, a path traversal and RCE vulnerability in Apache HTTP Server 2.4.49. It includes configuration requirements and references but lacks actual exploit code.
Classification
Writeup 90%
Target:
Apache HTTP Server 2.4.49
No auth needed
Prerequisites:
Apache HTTP Server 2.4.49 with mod_cgi enabled · Directory permissions allowing access
nomisec
WORKING POC
by ch4os443 · poc
https://github.com/ch4os443/CVE-2021-41773
This is a working exploit for CVE-2021-42013 (incorrectly referenced as CVE-2021-41773 in the repo name), targeting Apache HTTP Server 2.4.49/2.4.50. It leverages path traversal to achieve remote command execution via a crafted CGI request.
Classification
Working Poc 95%
Target:
Apache HTTP Server 2.4.49, 2.4.50
No auth needed
Prerequisites:
Target running vulnerable Apache version with CGI enabled
nomisec
SCANNER
by b1tsec · poc
https://github.com/b1tsec/CVE-2021-41773
This repository contains a Python script that scans for CVE-2021-41773, a path traversal vulnerability in Apache HTTP Server 2.4.49. The script checks if the target server is vulnerable by attempting to access /etc/passwd via a crafted URL.
Classification
Scanner 100%
Target:
Apache HTTP Server 2.4.49
No auth needed
Prerequisites:
Network access to the target server · Apache HTTP Server 2.4.49 with vulnerable configuration
nomisec
SCANNER
by pisut4152 · poc
https://github.com/pisut4152/Sigma-Rule-for-CVE-2021-41773-and-CVE-2021-42013-exploitation-attempt
This repository contains a Sigma rule for detecting exploitation attempts of CVE-2021-41773 and CVE-2021-42013, which are path traversal vulnerabilities in Apache HTTP Server 2.4.49 and 2.4.50. The rule identifies specific URI patterns used in exploitation attempts and checks for successful HTTP responses.
Classification
Scanner 90%
Target:
Apache HTTP Server 2.4.49, 2.4.50
No auth needed
Prerequisites:
Apache HTTP Server 2.4.49 or 2.4.50 with CGI scripts enabled
nomisec
SCANNER
by mohwahyudi · infoleak
https://github.com/mohwahyudi/cve-2021-41773
This repository contains a Python script that scans for Apache HTTP Server 2.4.49 instances vulnerable to CVE-2021-41773 (path traversal) using the Shodan API. It attempts to exploit the vulnerability by fetching /etc/passwd from vulnerable servers.
Classification
Scanner 90%
Target:
Apache HTTP Server 2.4.49
No auth needed
Prerequisites:
Shodan API key · Python 3 · Shodan module
nomisec
WORKING POC
by sixpacksecurity · poc
https://github.com/sixpacksecurity/CVE-2021-41773
This repository provides a Docker-based proof-of-concept for CVE-2021-41773, a path traversal vulnerability in Apache HTTP Server 2.4.49. The exploit demonstrates unauthorized access to sensitive files (e.g., /etc/passwd) via crafted URLs.
Classification
Working Poc 90%
Target:
Apache HTTP Server 2.4.49
No auth needed
Prerequisites:
Docker installed · Apache HTTP Server 2.4.49 running with vulnerable configuration
nomisec
WORKING POC
by Hattan515 · poc
https://github.com/Hattan515/POC-CVE-2021-41773
This PoC exploits CVE-2021-41773, a path traversal vulnerability in Apache HTTP Server 2.4.49, by sending a crafted request to access sensitive files like /etc/passwd. It supports single IP or bulk IP list checks.
Classification
Working Poc 95%
Target:
Apache HTTP Server 2.4.49
No auth needed
Prerequisites:
Network access to the target Apache server
nomisec
WORKING POC
by fnatalucci · poc
https://github.com/fnatalucci/CVE-2021-41773-RCE
This is a working exploit for CVE-2021-41773, a path traversal and RCE vulnerability in Apache 2.4.49. The script allows arbitrary file reads and command execution via crafted requests to the CGI directory.
Classification
Working Poc 95%
Target:
Apache HTTP Server 2.4.49
No auth needed
Prerequisites:
Target running Apache 2.4.49 with CGI enabled
nomisec
SCANNER
by TAI-REx · poc
https://github.com/TAI-REx/cve-2021-41773-nse
This repository provides an NSE (Nmap Scripting Engine) script to scan for the presence of CVE-2021-41773, a path traversal vulnerability in Apache HTTP Server 2.4.49. The script checks if a target server is vulnerable by leveraging Nmap's scripting capabilities.
Classification
Scanner 90%
Target:
Apache HTTP Server 2.4.49
No auth needed
Prerequisites:
Nmap installed · NSE script placed in the correct directory · Target IP and port
vulncheck_xdb
WORKING POC
remote
https://github.com/FakhriCRD/Apache-CVE-2021-42013-RCE-Exploit
This repository contains a functional exploit for CVE-2021-42013, targeting Apache HTTP Server 2.4.50 with CGI enabled. The exploit uses curl to bypass URL encoding issues and provides features like interactive shell, reverse shell generation, and system reconnaissance.
Classification
Working Poc 95%
Target:
Apache HTTP Server 2.4.50
No auth needed
Prerequisites:
Apache HTTP Server 2.4.50 with CGI enabled · curl installed on the attacker's system · netcat for reverse shell functionality
vulncheck_xdb
WORKING POC
remote
https://github.com/Ask-os/CVE-2021-41773
The repository contains a functional Python exploit for CVE-2021-41773, leveraging a path traversal vulnerability in Apache HTTP Server 2.4.49 to achieve remote code execution via crafted curl requests to a CGI script. The exploit allows arbitrary command execution on vulnerable servers with mod_cgi enabled.
Classification
Working Poc 95%
Target:
Apache HTTP Server 2.4.49
No auth needed
Prerequisites:
mod_cgi enabled · curl installed
vulncheck_xdb
WORKING POC
client-side
https://github.com/mmtalsi/toolbox
The repository contains a functional JWT-based authentication bypass exploit for CVE-2021-41773, targeting Apache HTTP Server path traversal. It includes tools for generating, testing, and brute-forcing JWT tokens, as well as modifying them to exploit vulnerabilities.
Classification
Working Poc 90%
Target:
Apache HTTP Server 2.4.49
No auth needed
Prerequisites:
access to target server · JWT token generation capabilities
vulncheck_xdb
WORKING POC
remote
https://github.com/dream434/cve-2021-42013-apache
The repository contains a functional Python exploit for CVE-2021-42013, targeting Apache 2.4.50. The exploit sends a crafted HTTP POST request to a vulnerable path, leveraging path traversal to execute arbitrary commands via a shell.
Classification
Working Poc 90%
Target:
Apache HTTP Server 2.4.50
No auth needed
Prerequisites:
Network access to the target Apache server · Apache 2.4.50 with vulnerable configuration
vulncheck_xdb
WORKING POC
remote
https://github.com/Fa1c0n35/CVE-2021-41773
This repository contains a functional Python exploit for CVE-2021-41773, which targets a path traversal and remote code execution vulnerability in Apache HTTP Server 2.4.49. The exploit leverages a crafted URL to access the system shell via the CGI-bin directory.
Classification
Working Poc 95%
Target:
Apache HTTP Server 2.4.49
No auth needed
Prerequisites:
Apache HTTP Server 2.4.49 with CGI enabled
vulncheck_xdb
WORKING POC
remote
https://github.com/thehackersbrain/CVE-2021-41773
This repository contains a functional Python exploit for CVE-2021-41773, which targets a path traversal and remote code execution vulnerability in Apache HTTP Server 2.4.49. The exploit leverages a crafted URL to access the system shell and execute arbitrary commands.
Classification
Working Poc 95%
Target:
Apache HTTP Server 2.4.49
No auth needed
Prerequisites:
Target running Apache HTTP Server 2.4.49 · Network access to the target
vulncheck_xdb
WORKING POC
remote
https://github.com/mauricelambert/CVE-2021-41773
This repository contains functional exploit code for CVE-2021-41773, a path traversal and command injection vulnerability in Apache HTTP Server 2.4.49. The scripts demonstrate file disclosure and remote command execution via crafted HTTP requests.
Classification
Working Poc 95%
Target:
Apache HTTP Server 2.4.49
No auth needed
Prerequisites:
vulnerable Apache HTTP Server 2.4.49 with CGI enabled
vulncheck_xdb
WORKING POC
infoleak
https://github.com/norrig/CVE-2021-41773-exploiter
This repository contains a functional Python exploit for CVE-2021-41773, a path traversal vulnerability in Apache HTTP Server 2.4.49. The exploit automates the process of testing multiple payloads to read arbitrary files (e.g., /etc/passwd) and includes an interactive menu for further actions like attempting RCE.
Classification
Working Poc 90%
Target:
Apache HTTP Server 2.4.49
No auth needed
Prerequisites:
Target running Apache HTTP Server 2.4.49 · Network access to the target server
exploitdb
WORKING POC
pythonwebappsmultiple
https://www.exploit-db.com/exploits/50512
This Python script exploits CVE-2021-41773, a path traversal and command injection vulnerability in Apache HTTP Server 2.4.49/2.4.50 with CGI enabled. It sends crafted POST requests to execute arbitrary commands via a malicious payload targeting the vulnerable CGI endpoint.
Classification
Working Poc 95%
Target:
Apache HTTP Server 2.4.49/2.4.50 (CGI enabled)
No auth needed
Prerequisites:
Apache HTTP Server 2.4.49 or 2.4.50 with CGI enabled · Network access to the target server