exploitdb
WORKING POC
VERIFIED
by Valentin Lobstein · pythonwebappsmultiple
https://www.exploit-db.com/exploits/50512
This exploit leverages path traversal and command injection in Apache HTTP Server 2.4.49/2.4.50 (with CGI enabled) to achieve remote code execution. It sends crafted POST requests to execute arbitrary commands via a vulnerable CGI endpoint.
Classification
Working Poc 95%
Target:
Apache HTTP Server 2.4.49/2.4.50 (CGI enabled)
No auth needed
Prerequisites:
Apache HTTP Server 2.4.49 or 2.4.50 with CGI enabled · Network access to the target server
exploitdb
WORKING POC
VERIFIED
by Lucas Souza · bashwebappsmultiple
https://www.exploit-db.com/exploits/50406
This exploit leverages a path traversal vulnerability in Apache HTTP Server 2.4.50 to achieve remote code execution (RCE) by sending a crafted request to the CGI binary path. The script reads a list of targets and executes a specified command on each host.
Classification
Working Poc 95%
Target:
Apache HTTP Server 2.4.50
No auth needed
Prerequisites:
Target running Apache HTTP Server 2.4.50 · Access to the CGI binary path
exploitdb
WORKING POC
by ThelastVvV · bashwebappsmultiple
https://www.exploit-db.com/exploits/50446
This exploit leverages a path traversal vulnerability in Apache HTTP Server 2.4.50 with CGI enabled to achieve remote code execution. It uses a series of encoded directory traversal sequences to bypass restrictions and execute a reverse shell via a temporary script.
Classification
Working Poc 95%
Target:
Apache HTTP Server 2.4.50 with CGI enabled
No auth needed
Prerequisites:
Apache HTTP Server 2.4.50 with CGI enabled · Network access to the target server
nomisec
WORKING POC
25 stars
by walnutsecurity · remote
https://github.com/walnutsecurity/cve-2021-42013
This repository contains a Python script that exploits CVE-2021-42013, a path traversal and remote code execution vulnerability in Apache HTTP Server versions 2.4.49 and 2.4.50. The script checks for both path traversal and RCE vulnerabilities by sending crafted HTTP requests to the target server.
Classification
Working Poc 95%
Attack Type
Rce | Info Leak
Target:
Apache HTTP Server 2.4.49, 2.4.50
No auth needed
Prerequisites:
Target server running Apache HTTP Server 2.4.49 or 2.4.50 · CGI-BIN enabled for RCE · Alias directory configured for path traversal
nomisec
WRITEUP
17 stars
by Vulnmachines · poc
https://github.com/Vulnmachines/cve-2021-42013
This repository contains a README file describing CVE-2021-42013, a path traversal vulnerability in Apache 2.4.50. No exploit code or technical details are provided.
Classification
Writeup 90%
Target:
Apache 2.4.50
No auth needed
Prerequisites:
Apache 2.4.50 installation
nomisec
WORKING POC
10 stars
by asaotomo · remote
https://github.com/asaotomo/CVE-2021-42013-Apache-RCE-Poc-Exp
This repository contains a working proof-of-concept exploit for CVE-2021-42013, an Apache HTTP Server path traversal and remote code execution vulnerability affecting versions 2.4.49 and 2.4.50. The PoC includes both file read and RCE capabilities via crafted HTTP requests.
Classification
Working Poc 95%
Target:
Apache HTTP Server 2.4.49, 2.4.50
No auth needed
Prerequisites:
Target running vulnerable Apache version · CGI enabled on the target server
nomisec
WORKING POC
9 stars
by andrea-mattioli · poc
https://github.com/andrea-mattioli/apache-exploit-CVE-2021-42013
This repository contains a Python-based exploit for CVE-2021-42013, targeting Apache HTTP Server 2.4.49. The exploit leverages path traversal and command injection vulnerabilities to read sensitive files (e.g., /etc/passwd) and execute arbitrary commands via a POST request to a CGI endpoint.
Classification
Working Poc 95%
Target:
Apache HTTP Server 2.4.49
No auth needed
Prerequisites:
Target running Apache 2.4.49 with CGI enabled · Network access to the target server
nomisec
WORKING POC
7 stars
by TheLastVvV · poc
https://github.com/TheLastVvV/CVE-2021-42013_Reverse-Shell
This PoC exploits CVE-2021-42013, a path traversal and command injection vulnerability in Apache 2.4.50 with CGI enabled. It uses a crafted curl request to write a reverse shell script to the target system and execute it.
Classification
Working Poc 95%
Target:
Apache HTTP Server 2.4.50 with CGI enabled
No auth needed
Prerequisites:
Target must be running Apache 2.4.50 with CGI enabled · Network access to the target server
nomisec
WORKING POC
4 stars
by K3ysTr0K3R · remote
https://github.com/K3ysTr0K3R/CVE-2021-42013-EXPLOIT
This is a functional exploit for CVE-2021-42013, targeting Apache HTTP Server 2.4.49 and 2.4.50 via a path traversal vulnerability to achieve remote code execution. It includes both a vulnerability scanner and a reverse shell payload.
Classification
Working Poc 95%
Target:
Apache HTTP Server 2.4.49, 2.4.50
No auth needed
Prerequisites:
Target must have CGI scripts enabled · Path traversal must be possible due to misconfiguration
nomisec
WORKING POC
3 stars
by BassoNicolas · remote
https://github.com/BassoNicolas/CVE-2021-42013
This repository contains a Python script that checks for and exploits CVE-2021-42013, a path traversal and remote code execution vulnerability in Apache HTTP Server 2.4.50. The script allows users to execute arbitrary commands on vulnerable servers via a crafted HTTP request.
Classification
Working Poc 95%
Target:
Apache HTTP Server 2.4.50
No auth needed
Prerequisites:
Network access to the target server · Apache HTTP Server 2.4.50 with vulnerable configuration
nomisec
WORKING POC
2 stars
by twseptian · remote
https://github.com/twseptian/cve-2021-42013-docker-lab
This repository contains a functional proof-of-concept for CVE-2021-42013, demonstrating path traversal and remote code execution in Apache HTTP Server 2.4.49/2.4.50. It includes Python scripts and Docker configurations to exploit the vulnerability.
Classification
Working Poc 95%
Target:
Apache HTTP Server 2.4.49, 2.4.50
No auth needed
Prerequisites:
Apache HTTP Server 2.4.49 or 2.4.50 with CGI enabled · Access to the target server
nomisec
WORKING POC
2 stars
by TheLastVvV · poc
https://github.com/TheLastVvV/CVE-2021-42013
This PoC exploits CVE-2021-42013, a path traversal vulnerability in Apache HTTP Server 2.4.50, allowing unauthorized access to files outside the web root. The script uses a crafted curl request with encoded path traversal sequences to retrieve arbitrary files.
Classification
Working Poc 90%
Target:
Apache HTTP Server 2.4.50
No auth needed
Prerequisites:
Apache HTTP Server 2.4.50 without CGI enabled
nomisec
SCANNER
1 stars
by drackyjr · poc
https://github.com/drackyjr/CVE-2021-42013
This repository contains a Python-based scanner for detecting CVE-2021-41773 and CVE-2021-42013 vulnerabilities in Apache HTTP Server versions 2.4.49 and 2.4.50. It checks for path traversal and potential RCE via mod_cgi by sending crafted HTTP requests.
Classification
Scanner 95%
Attack Type
Info Leak | Rce
Target:
Apache HTTP Server 2.4.49, 2.4.50
No auth needed
Prerequisites:
Network access to target Apache server · mod_cgi enabled for RCE checks
nomisec
WORKING POC
1 stars
by bananoname · remote
https://github.com/bananoname/cve-2021-42013
This repository contains a Python script and a bash script to exploit CVE-2021-42013, a path traversal and remote code execution vulnerability in Apache HTTP Server versions 2.4.49 and 2.4.50. The scripts test for both path traversal and RCE by sending crafted requests to vulnerable endpoints.
Classification
Working Poc 95%
Attack Type
Rce | Info Leak
Target:
Apache HTTP Server 2.4.49, 2.4.50
No auth needed
Prerequisites:
CGI-BIN enabled for RCE · icons directory in Alias section for path traversal
nomisec
STUB
1 stars
by Hamesawian · infoleak
https://github.com/Hamesawian/CVE-2021-42013
The repository contains only a README.md with minimal information about CVE-2021-42013, an Apache HTTP Server path traversal vulnerability. No exploit code or technical details are provided.
Target:
Apache HTTP Server 2.4.50
No auth needed
nomisec
WORKING POC
1 stars
by vudala · poc
https://github.com/vudala/CVE-2021-42013
This repository provides a Dockerized environment to reproduce CVE-2021-42013, a path traversal and remote code execution vulnerability in Apache HTTP Server 2.4.50. It includes a Dockerfile to build a vulnerable Apache instance and a Suricata configuration for detection.
Classification
Working Poc 90%
Target:
Apache HTTP Server 2.4.50
No auth needed
Prerequisites:
Docker environment · Network access to the target
nomisec
WORKING POC
1 stars
by cybfar · remote
https://github.com/cybfar/cve-2021-42013-httpd
This repository provides a Dockerized environment for testing CVE-2021-42013, a path traversal and potential RCE vulnerability in Apache HTTP Server 2.4.50. It includes a curl command to demonstrate the path traversal exploit.
Classification
Working Poc 90%
Target:
Apache HTTP Server 2.4.50
No auth needed
Prerequisites:
Docker · Python · Curl · Apache HTTP Server 2.4.50 with vulnerable configuration
nomisec
WORKING POC
1 stars
by jas9reet · remote
https://github.com/jas9reet/CVE-2021-42013-LAB
This repository contains a working exploit for CVE-2021-42013, a path traversal and command injection vulnerability in Apache HTTP Server 2.4.50. The exploit uses a malformed CGI path to execute arbitrary commands on the target system.
Classification
Working Poc 95%
Target:
Apache HTTP Server 2.4.50
No auth needed
Prerequisites:
Target running Apache HTTP Server 2.4.50 with CGI enabled
nomisec
WORKING POC
1 stars
by robotsense1337 · poc
https://github.com/robotsense1337/CVE-2021-42013
This exploit leverages a path traversal vulnerability in Apache HTTP Server 2.4.50 (CVE-2021-42013) by using a crafted payload to bypass access controls and retrieve files outside the web root. The script uses curl to send the malicious request to the target server.
Classification
Working Poc 90%
Target:
Apache HTTP Server 2.4.50
No auth needed
Prerequisites:
Target server running Apache HTTP Server 2.4.50 · Network access to the target server
nomisec
WORKING POC
by zeynepglygt · poc
https://github.com/zeynepglygt/apache-cve-2021-42013-rce
This repository provides a Docker-based lab environment to simulate and exploit CVE-2021-42013, a path traversal and RCE vulnerability in Apache HTTP Server 2.4.49. It includes functional exploit commands to demonstrate both path traversal and remote code execution.
Classification
Working Poc 95%
Target:
Apache HTTP Server 2.4.49
No auth needed
Prerequisites:
Docker environment · Apache HTTP Server 2.4.49 with vulnerable configuration
gitlab
WORKING POC
by vulnerability-writeup · poc
https://gitlab.com/vulnerability-writeup/cve-2021-41773
This repository contains a functional Python exploit for CVE-2021-42013, targeting Apache HTTP Server 2.4.49/2.4.50 with CGI enabled. The exploit leverages path traversal and command injection to achieve remote code execution (RCE).
Classification
Working Poc 95%
Target:
Apache HTTP Server 2.4.49/2.4.50
No auth needed
Prerequisites:
CGI enabled on the target Apache server
gitlab
WORKING POC
by amstal93 · poc
https://gitlab.com/amstal93/cve-2021-41773
This repository contains a functional Python exploit for CVE-2021-42013, targeting Apache HTTP Server 2.4.49/2.4.50 with CGI enabled. The exploit leverages path traversal and command injection to achieve remote code execution (RCE).
Classification
Working Poc 95%
Target:
Apache HTTP Server 2.4.49/2.4.50
No auth needed
Prerequisites:
CGI enabled on the target Apache server
gitlab
WORKING POC
by checkscale-gitlab · remote
https://gitlab.com/checkscale-gitlab/cve-2021-41773
This repository contains a functional Python exploit for CVE-2021-42013, targeting Apache HTTP Server 2.4.49/2.4.50 with path traversal and command injection via malformed CGI paths. The exploit includes interactive shell capabilities and payloads for both affected versions.
Classification
Working Poc 95%
Target:
Apache HTTP Server 2.4.49/2.4.50 (CGI enabled)
No auth needed
Prerequisites:
CGI enabled on target Apache server · Network access to target
gitlab
WORKING POC
by bc-scale · poc
https://gitlab.com/bc-scale/cve-2021-41773
This repository contains a functional Python exploit for CVE-2021-42013, targeting Apache HTTP Server 2.4.49/2.4.50 with CGI enabled. The exploit leverages path traversal and command injection to achieve remote code execution (RCE).
Classification
Working Poc 95%
Target:
Apache HTTP Server 2.4.49/2.4.50
No auth needed
Prerequisites:
CGI enabled on the target Apache server
nomisec
WORKING POC
by ranasen-rat · remote
https://github.com/ranasen-rat/cve-2021-42013
This repository contains a Python script that exploits CVE-2021-42013, a path traversal and remote code execution vulnerability in Apache HTTP Server versions 2.4.49 and 2.4.50. The script checks for both path traversal and RCE vulnerabilities by sending crafted HTTP requests to the target server.
Classification
Working Poc 95%
Attack Type
Rce | Info Leak
Target:
Apache HTTP Server 2.4.49, 2.4.50
No auth needed
Prerequisites:
Target server running Apache HTTP Server 2.4.49 or 2.4.50 · CGI-BIN enabled for RCE · Icons directory configured for path traversal
nomisec
WORKING POC
by FakhriCRD · remote
https://github.com/FakhriCRD/Apache-CVE-2021-42013-RCE-Exploit
This repository contains a functional exploit for CVE-2021-42013, targeting Apache HTTP Server 2.4.50 with CGI enabled. It leverages path traversal to achieve remote code execution via curl-based payload delivery, including reverse shell capabilities.
Classification
Working Poc 95%
Target:
Apache HTTP Server 2.4.50
No auth needed
Prerequisites:
Apache 2.4.50 with CGI enabled · curl installed on attacker machine · network access to target
nomisec
WORKING POC
by Makavellik · remote
https://github.com/Makavellik/POC-CVE-2021-42013-EXPLOIT
This is a Python-based exploit for CVE-2021-42013, targeting a path traversal vulnerability in Apache HTTP Server. The script includes functionality for detecting remote OS, testing vulnerability, and executing commands via a crafted path.
Classification
Working Poc 90%
Target:
Apache HTTP Server 2.4.49
No auth needed
Prerequisites:
Target must be running Apache HTTP Server 2.4.49 · Network access to the target server
github
WORKING POC
by enciphers-team · pythonpoc
https://github.com/enciphers-team/cve-exploits/tree/main/cve-2021-42013-exploit.sh
This script exploits CVE-2021-42013, a path traversal vulnerability in Apache HTTP Server 2.4.49 and 2.4.50, by sending a crafted URL with a malicious payload to achieve remote code execution (RCE) via a reverse shell.
Classification
Working Poc 90%
Target:
Apache HTTP Server 2.4.49, 2.4.50
No auth needed
Prerequisites:
target IP and port · attacker-controlled listener IP and port
nomisec
WORKING POC
by dream434 · remote
https://github.com/dream434/cve-2021-42013-apache
This PoC exploits CVE-2021-42013, a path traversal and command injection vulnerability in Apache HTTP Server 2.4.50, allowing remote code execution via a maliciously crafted request to the CGI binary.
Classification
Working Poc 90%
Target:
Apache HTTP Server 2.4.50
No auth needed
Prerequisites:
Target running vulnerable Apache HTTP Server 2.4.50 · Network access to the target
nomisec
WORKING POC
by asepsaepdin · remote
https://github.com/asepsaepdin/CVE-2021-42013
This repository contains a functional exploit for CVE-2021-42013, targeting Apache 2.4.49/2.4.50 with path traversal and RCE via CGI script execution. The PoC includes a bash script that crafts malicious requests to achieve remote command execution.
Classification
Working Poc 95%
Target:
Apache HTTP Server 2.4.49, 2.4.50
No auth needed
Prerequisites:
Apache 2.4.49/2.4.50 with CGI enabled · Network access to the target
nomisec
WORKING POC
by 12345qwert123456 · remote
https://github.com/12345qwert123456/CVE-2021-42013
This repository provides a vulnerable Dockerized Apache 2.4.50 service and a curl command to exploit CVE-2021-42013, a path traversal and command injection vulnerability. The PoC demonstrates remote code execution (RCE) via a maliciously crafted request to the CGI bin directory.
Classification
Working Poc 95%
Target:
Apache HTTP Server 2.4.50
No auth needed
Prerequisites:
Docker installed for vulnerable service setup · curl or similar HTTP client for exploitation
nomisec
WORKING POC
by hadrian3689 · remote
https://github.com/hadrian3689/apache_2.4.50
This repository contains a Python script that exploits CVE-2021-42013, a path traversal vulnerability in Apache HTTP Server 2.4.50, allowing LFI and RCE via cgi-bin. The script supports direct command execution and a pseudo-shell for continuous interaction.
Classification
Working Poc 95%
Target:
Apache HTTP Server 2.4.50
No auth needed
Prerequisites:
Apache HTTP Server 2.4.50 with cgi-bin enabled for RCE · Network access to the target server
nomisec
WORKING POC
by mightysai1997 · remote
https://github.com/mightysai1997/cve-2021-42013.get
This repository contains a Python script that exploits CVE-2021-42013, a path traversal and remote code execution vulnerability in Apache HTTP Server 2.4.50. The script includes functionality to test for both path traversal and RCE, with support for bulk scanning via a list of targets.
Classification
Working Poc 95%
Attack Type
Rce | Info Leak
Target:
Apache HTTP Server 2.4.50
No auth needed
Prerequisites:
Apache HTTP Server 2.4.50 with CGI-BIN enabled or 'icons' directory in Alias section
nomisec
WRITEUP
by mightysai1997 · poc
https://github.com/mightysai1997/cve-2021-42013L
This repository contains a README file describing CVE-2021-42013, an Apache 2.4.50 path traversal vulnerability, but lacks actual exploit code or technical details. It primarily serves as a reference with links to external resources.
Classification
Writeup 90%
Target:
Apache HTTP Server 2.4.50
No auth needed
Prerequisites:
Apache HTTP Server 2.4.50 with vulnerable configuration
nomisec
WORKING POC
by mightysai1997 · remote
https://github.com/mightysai1997/cve-2021-42013
This repository contains a Python script that exploits CVE-2021-42013, a path traversal and remote code execution vulnerability in Apache HTTP Server 2.4.50. The script checks for vulnerable configurations and executes payloads to verify exploitation.
Classification
Working Poc 95%
Attack Type
Rce | Info Leak
Target:
Apache HTTP Server 2.4.50
No auth needed
Prerequisites:
Apache HTTP Server 2.4.50 with CGI-BIN enabled or 'icons' directory in Alias section
nomisec
WORKING POC
by viliuspovilaika · remote
https://github.com/viliuspovilaika/cve-2021-42013
This is a C implementation of the Apache 2.4.50 path traversal and command injection exploit (CVE-2021-42013). It leverages a vulnerability in the normalization of CGI paths to execute arbitrary commands via a crafted URL and POST payload.
Classification
Working Poc 100%
Target:
Apache HTTP Server 2.4.50
No auth needed
Prerequisites:
Target running Apache 2.4.50 with CGI enabled · Network access to the target server
nomisec
WORKING POC
by xMohamed0 · poc
https://github.com/xMohamed0/CVE-2021-42013-ApacheRCE
This PoC exploits CVE-2021-42013, a command injection vulnerability in Apache HTTP Server 2.4.49 and 2.4.50. It sends a crafted request to trigger a reverse shell to a specified IP and port.
Classification
Working Poc 90%
Target:
Apache HTTP Server 2.4.49, 2.4.50
No auth needed
Prerequisites:
Target running vulnerable Apache version · Network connectivity to target · Listener set up on attacker's machine
nomisec
WORKING POC
by LayarKacaSiber · poc
https://github.com/LayarKacaSiber/CVE-2021-42013
This repository contains a working exploit for CVE-2021-42013, a path traversal and RCE vulnerability in Apache HTTP Server 2.4.50. The exploit uses a bash script to send crafted HTTP requests to vulnerable servers, leveraging path traversal to execute arbitrary commands.
Classification
Working Poc 95%
Target:
Apache HTTP Server 2.4.50
No auth needed
Prerequisites:
Vulnerable Apache HTTP Server 2.4.50 · Network access to the target server
vulncheck_xdb
WORKING POC
remote
https://github.com/Zyx2440/Apache-HTTP-Server-2.4.50-RCE
This repository contains a functional exploit for CVE-2021-42013, targeting Apache HTTP Server 2.4.50. The exploit checks for the vulnerable version and attempts to achieve RCE via directory traversal and reverse shell injection if CGI is enabled.
Classification
Working Poc 95%
Target:
Apache HTTP Server 2.4.50
No auth needed
Prerequisites:
Apache HTTP Server 2.4.50 with CGI enabled for RCE · Network access to the target server
vulncheck_xdb
WORKING POC
remote
https://github.com/0xGabe/Apache-CVEs
This repository contains functional Python scripts for exploiting CVE-2021-41773 and CVE-2021-42013, which are path traversal and remote command execution vulnerabilities in Apache HTTP Server versions 2.4.49 and 2.4.50, respectively. The scripts demonstrate both path traversal and RCE capabilities by leveraging malformed URI paths to bypass security checks.
Classification
Working Poc 95%
Target:
Apache HTTP Server 2.4.49, 2.4.50
No auth needed
Prerequisites:
Target running vulnerable Apache version · Network access to the target server
vulncheck_xdb
WORKING POC
remote
https://github.com/CalfCrusher/Path-traversal-RCE-Apache-2.4.49-2.4.50-Exploit
This repository contains a functional exploit for CVE-2021-41773 and CVE-2021-42013, targeting path traversal and RCE vulnerabilities in Apache HTTP Server versions 2.4.49 and 2.4.50. The exploit tests for both CGI and non-CGI configurations, demonstrating file disclosure and remote code execution capabilities.
Classification
Working Poc 95%
Target:
Apache HTTP Server 2.4.49-2.4.50
No auth needed
Prerequisites:
Apache HTTP Server 2.4.49 or 2.4.50 · Specific path normalization misconfiguration · CGI enabled for RCE
vulncheck_xdb
WORKING POC
remote
https://github.com/mauricelambert/CVE-2021-42013
This repository contains functional exploit code for CVE-2021-42013, a path traversal and command injection vulnerability in Apache HTTP Server. The scripts (Ruby and Python) allow file reading and command execution on vulnerable targets.
Classification
Working Poc 95%
Target:
Apache HTTP Server 2.4.49
No auth needed
Prerequisites:
Vulnerable Apache HTTP Server instance · Network access to the target
vulncheck_xdb
WORKING POC
infoleak
https://github.com/MrCl0wnLab/SimplesApachePathTraversal
This repository contains a functional Python-based tool for testing Apache Path Traversal vulnerabilities, specifically CVE-2021-42013 and related CVEs. It includes exploit paths and a script to automate testing against target hosts.
Classification
Working Poc 95%
Target:
Apache HTTP Server
No auth needed
Prerequisites:
target host running vulnerable Apache version
metasploit
WORKING POC
by Ash Daulton, Dhiraj Mishra, mekhalleh (RAMELLA Sébastien) · rubypoc
https://github.com/rapid7/metasploit-framework/blob/master/modules/auxiliary/scanner/http/apache_normalize_path.rb
This Metasploit module exploits CVE-2021-41773 and CVE-2021-42013, which are path traversal vulnerabilities in Apache 2.4.49 and 2.4.50. It checks for vulnerability, tests for RCE via mod_cgi, and reads arbitrary files.
Classification
Working Poc 100%
Target:
Apache HTTP Server 2.4.49, 2.4.50
No auth needed
Prerequisites:
mod_cgi enabled for RCE · files outside document root not protected by 'require all denied'
metasploit
WORKING POC
EXCELLENT
by Ash Daulton, Dhiraj Mishra, mekhalleh (RAMELLA Sébastien) · rubypoclinux
https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/multi/http/apache_normalize_path_rce.rb
This Metasploit module exploits CVE-2021-41773 and CVE-2021-42013, which are path traversal vulnerabilities in Apache 2.4.49 and 2.4.50. It allows unauthenticated remote command execution by leveraging improper normalization of paths in CGI scripts.
Classification
Working Poc 100%
Target:
Apache HTTP Server 2.4.49, 2.4.50
No auth needed
Prerequisites:
CGI enabled on the target server · Files outside document root not protected by 'require all denied'