CVE-2021-42013

CRITICAL KEV RANSOMWARE NUCLEI LAB

Apache HTTP Server < 9.2.6.0 - Path Traversal

Title source: rule

Description

It was found that the fix for CVE-2021-41773 in Apache HTTP Server 2.4.50 was insufficient. An attacker could use a path traversal attack to map URLs to files outside the directories configured by Alias-like directives. If files outside of these directories are not protected by the usual default configuration "require all denied", these requests can succeed. If CGI scripts are also enabled for these aliased pathes, this could allow for remote code execution. This issue only affects Apache 2.4.49 and Apache 2.4.50 and not earlier versions.

Exploits (45)

exploitdb WORKING POC VERIFIED
by Valentin Lobstein · pythonwebappsmultiple
https://www.exploit-db.com/exploits/50512
exploitdb WORKING POC VERIFIED
by Lucas Souza · bashwebappsmultiple
https://www.exploit-db.com/exploits/50406
exploitdb WORKING POC
by ThelastVvV · bashwebappsmultiple
https://www.exploit-db.com/exploits/50446
nomisec WORKING POC 25 stars
by walnutsecurity · remote
https://github.com/walnutsecurity/cve-2021-42013
nomisec WRITEUP 17 stars
by Vulnmachines · poc
https://github.com/Vulnmachines/cve-2021-42013
nomisec WORKING POC 10 stars
by asaotomo · remote
https://github.com/asaotomo/CVE-2021-42013-Apache-RCE-Poc-Exp
nomisec WORKING POC 9 stars
by andrea-mattioli · poc
https://github.com/andrea-mattioli/apache-exploit-CVE-2021-42013
nomisec WORKING POC 7 stars
by TheLastVvV · poc
https://github.com/TheLastVvV/CVE-2021-42013_Reverse-Shell
nomisec WORKING POC 4 stars
by K3ysTr0K3R · remote
https://github.com/K3ysTr0K3R/CVE-2021-42013-EXPLOIT
nomisec WORKING POC 3 stars
by BassoNicolas · remote
https://github.com/BassoNicolas/CVE-2021-42013
nomisec WORKING POC 2 stars
by twseptian · remote
https://github.com/twseptian/cve-2021-42013-docker-lab
nomisec WORKING POC 2 stars
by TheLastVvV · poc
https://github.com/TheLastVvV/CVE-2021-42013
nomisec SCANNER 1 stars
by drackyjr · poc
https://github.com/drackyjr/CVE-2021-42013
nomisec WORKING POC 1 stars
by bananoname · remote
https://github.com/bananoname/cve-2021-42013
nomisec STUB 1 stars
by Hamesawian · infoleak
https://github.com/Hamesawian/CVE-2021-42013
nomisec WORKING POC 1 stars
by vudala · poc
https://github.com/vudala/CVE-2021-42013
nomisec WORKING POC 1 stars
by cybfar · remote
https://github.com/cybfar/cve-2021-42013-httpd
nomisec WORKING POC 1 stars
by jas9reet · remote
https://github.com/jas9reet/CVE-2021-42013-LAB
nomisec WORKING POC 1 stars
by robotsense1337 · poc
https://github.com/robotsense1337/CVE-2021-42013
nomisec WORKING POC
by zeynepglygt · poc
https://github.com/zeynepglygt/apache-cve-2021-42013-rce
gitlab WORKING POC
by vulnerability-writeup · poc
https://gitlab.com/vulnerability-writeup/cve-2021-41773
gitlab WORKING POC
by amstal93 · poc
https://gitlab.com/amstal93/cve-2021-41773
gitlab WORKING POC
by checkscale-gitlab · remote
https://gitlab.com/checkscale-gitlab/cve-2021-41773
gitlab WORKING POC
by bc-scale · poc
https://gitlab.com/bc-scale/cve-2021-41773
nomisec WORKING POC
by ranasen-rat · remote
https://github.com/ranasen-rat/cve-2021-42013
nomisec WORKING POC
by FakhriCRD · remote
https://github.com/FakhriCRD/Apache-CVE-2021-42013-RCE-Exploit
nomisec WORKING POC
by Makavellik · remote
https://github.com/Makavellik/POC-CVE-2021-42013-EXPLOIT
github WORKING POC
by enciphers-team · pythonpoc
https://github.com/enciphers-team/cve-exploits/tree/main/cve-2021-42013-exploit.sh
nomisec WORKING POC
by dream434 · remote
https://github.com/dream434/cve-2021-42013-apache
nomisec WORKING POC
by asepsaepdin · remote
https://github.com/asepsaepdin/CVE-2021-42013
nomisec WORKING POC
by 12345qwert123456 · remote
https://github.com/12345qwert123456/CVE-2021-42013
nomisec WORKING POC
by hadrian3689 · remote
https://github.com/hadrian3689/apache_2.4.50
nomisec WORKING POC
by mightysai1997 · remote
https://github.com/mightysai1997/cve-2021-42013.get
nomisec WRITEUP
by mightysai1997 · poc
https://github.com/mightysai1997/cve-2021-42013L
nomisec WORKING POC
by mightysai1997 · remote
https://github.com/mightysai1997/cve-2021-42013
nomisec WORKING POC
by viliuspovilaika · remote
https://github.com/viliuspovilaika/cve-2021-42013
nomisec WORKING POC
by xMohamed0 · poc
https://github.com/xMohamed0/CVE-2021-42013-ApacheRCE
nomisec WORKING POC
by LayarKacaSiber · poc
https://github.com/LayarKacaSiber/CVE-2021-42013
vulncheck_xdb WORKING POC
remote
https://github.com/Zyx2440/Apache-HTTP-Server-2.4.50-RCE
vulncheck_xdb WORKING POC
remote
https://github.com/0xGabe/Apache-CVEs
vulncheck_xdb WORKING POC
remote
https://github.com/CalfCrusher/Path-traversal-RCE-Apache-2.4.49-2.4.50-Exploit
vulncheck_xdb WORKING POC
remote
https://github.com/mauricelambert/CVE-2021-42013
vulncheck_xdb WORKING POC
infoleak
https://github.com/MrCl0wnLab/SimplesApachePathTraversal
metasploit WORKING POC
by Ash Daulton, Dhiraj Mishra, mekhalleh (RAMELLA Sébastien) · rubypoc
https://github.com/rapid7/metasploit-framework/blob/master/modules/auxiliary/scanner/http/apache_normalize_path.rb
metasploit WORKING POC EXCELLENT
by Ash Daulton, Dhiraj Mishra, mekhalleh (RAMELLA Sébastien) · rubypoclinux
https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/multi/http/apache_normalize_path_rce.rb

Nuclei Templates (1)

Apache 2.4.49/2.4.50 - Path Traversal and Remote Code Execution
CRITICALVERIFIEDby nvn1729,0xd0ff9,666asd
Shodan: cpe:"cpe:2.3:a:apache:http_server" || apache 2.4.49

References (31)

... and 11 more

Scores

CVSS v3 9.8
EPSS 0.9441
EPSS Percentile 100.0%
Attack Vector NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Lab Environment

COMMUNITY
Community Lab
docker pull httpd:2.4.49
docker pull httpd:2.4.50
docker pull apachecgi:1
+35 more repos

Details

CISA KEV 2021-11-03
VulnCheck KEV 2021-11-03
InTheWild.io 2021-10-21
ENISA EUVD EUVD-2021-29001
Ransomware Use Confirmed
CWE
CWE-22
Status published
Products (10)
apache/http_server 2.4.49
apache/http_server 2.4.50
fedoraproject/fedora 34
fedoraproject/fedora 35
netapp/cloud_backup
oracle/instantis_enterprisetrack 17.1
oracle/instantis_enterprisetrack 17.2
oracle/instantis_enterprisetrack 17.3
oracle/jd_edwards_enterpriseone_tools < 9.2.6.0
oracle/secure_backup < 18.1.0.1.0
Published Oct 07, 2021
KEV Added Nov 03, 2021
Tracked Since Feb 18, 2026