CVE-2021-42013

Description from NVD

It was found that the fix for CVE-2021-41773 in Apache HTTP Server 2.4.50 was insufficient. An attacker could use a path traversal attack to map URLs to files outside the directories configured by Alias-like directives. If files outside of these directories are not protected by the usual default configuration "require all denied", these requests can succeed. If CGI scripts are also enabled for these aliased pathes, this could allow for remote code execution. This issue only affects Apache 2.4.49 and Apache 2.4.50 and not earlier versions.

Information Acquisition Date:2021-11-30T14:54Z
CVSS 2.0: 7.5 HIGH CVSS 3.x: 9.8 CRITICAL

▼ CVSS3 Vec CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

▼ CVSS2 Vec AV:N/AC:L/Au:N/C:P/I:P/A:P

NVD References

 https://httpd.apache.org/security/vulnerabilities_24.html
     source:MISC
     tags:Vendor Advisory    
 [announce] 20211007 CVE-2021-42013: Path Traversal and Remote Code Execution in Apache HTTP Server 2.4.49 and 2.4.50 (incomplete fix of CVE-2021-41773)
     source:MLIST
     tags:Mailing List    
 [httpd-users] 20211007 [users@httpd] CVE-2021-42013: Path Traversal and Remote Code Execution in Apache HTTP Server 2.4.49 and 2.4.50 (incomplete fix of CVE-2021-41773)
     source:MLIST
     tags:Mailing List    
 [oss-security] 20211007 CVE-2021-42013: Path Traversal and Remote Code Execution in Apache HTTP Server 2.4.49 and 2.4.50 (incomplete fix of CVE-2021-41773)
     source:MLIST
     tags:Mailing List    Third Party Advisory    
 20211007 Apache HTTP Server Vulnerabilties: October 2021
     source:CISCO
     tags:Third Party Advisory    
 JVN#51106450
     source:JVN
     tags:Third Party Advisory    
 [oss-security] 20211008 Re: CVE-2021-42013: Path Traversal and Remote Code Execution in Apache HTTP Server 2.4.49 and 2.4.50 (incomplete fix of CVE-2021-41773)
     source:MLIST
     tags:Mailing List    Third Party Advisory    
 [httpd-cvs] 20211008 [httpd-site] branch main updated: * Align with CVE-2021-42013 based on the latest findings
     source:MLIST
     tags:Mailing List    Vendor Advisory    
 [oss-security] 20211008 Re: CVE-2021-42013: Path Traversal and Remote Code Execution in Apache HTTP Server 2.4.49 and 2.4.50 (incomplete fix of CVE-2021-41773)
     source:MLIST
     tags:Mailing List    Third Party Advisory    
 [oss-security] 20211008 Re: CVE-2021-42013: Path Traversal and Remote Code Execution in Apache HTTP Server 2.4.49 and 2.4.50 (incomplete fix of CVE-2021-41773)
     source:MLIST
     tags:Mailing List    Third Party Advisory    
 [oss-security] 20211008 Re: CVE-2021-42013: Path Traversal and Remote Code Execution in Apache HTTP Server 2.4.49 and 2.4.50 (incomplete fix of CVE-2021-41773)
     source:MLIST
     tags:Mailing List    Third Party Advisory    
 [oss-security] 20211008 Re: CVE-2021-42013: Path Traversal and Remote Code Execution in Apache HTTP Server 2.4.49 and 2.4.50 (incomplete fix of CVE-2021-41773)
     source:MLIST
     tags:Mailing List    Third Party Advisory    
 [oss-security] 20211008 Re: CVE-2021-42013: Path Traversal and Remote Code Execution in Apache HTTP Server 2.4.49 and 2.4.50 (incomplete fix of CVE-2021-41773)
     source:MLIST
     tags:Mailing List    Third Party Advisory    
 [oss-security] 20211009 Re: CVE-2021-42013: Path Traversal and Remote Code Execution in Apache HTTP Server 2.4.49 and 2.4.50 (incomplete fix of CVE-2021-41773)
     source:MLIST
     tags:Mailing List    Third Party Advisory    
 [oss-security] 20211011 Re: CVE-2021-42013: Path Traversal and Remote Code Execution in Apache HTTP Server 2.4.49 and 2.4.50 (incomplete fix of CVE-2021-41773)
     source:MLIST
     tags:Mailing List    Third Party Advisory    
 FEDORA-2021-2a10bc68a4
     source:FEDORA
     tags:Mailing List    Third Party Advisory    
 http://packetstormsecurity.com/files/164501/Apache-HTTP-Server-2.4.50-Path-Traversal-Code-Execution.html
     source:MISC
     tags:Exploit    Third Party Advisory    VDB Entry    
 FEDORA-2021-aaf90ef84a
     source:FEDORA
     tags:Mailing List    
 [oss-security] 20211015 Re: CVE-2021-42013: Path Traversal and Remote Code Execution in Apache HTTP Server 2.4.49 and 2.4.50 (incomplete fix of CVE-2021-41773)
     source:MLIST
     tags:Mailing List    Third Party Advisory    
 [oss-security] 20211016 Re: CVE-2021-42013: Path Traversal and Remote Code Execution in Apache HTTP Server 2.4.49 and 2.4.50 (incomplete fix of CVE-2021-41773)
     source:MLIST
     tags:Mailing List    Third Party Advisory    
 http://packetstormsecurity.com/files/164609/Apache-HTTP-Server-2.4.50-Remote-Code-Execution.html
     source:MISC
     tags:Exploit    Third Party Advisory    VDB Entry    
 http://packetstormsecurity.com/files/164629/Apache-2.4.49-2.4.50-Traversal-Remote-Code-Execution.html
     source:MISC
     tags:Exploit    Third Party Advisory    VDB Entry    
 https://security.netapp.com/advisory/ntap-20211029-0009/
     source:CONFIRM
     tags:Third Party Advisory    
 http://packetstormsecurity.com/files/164941/Apache-HTTP-Server-2.4.50-Remote-Code-Execution.html
     source:MISC
     tags:
 http://packetstormsecurity.com/files/165089/Apache-HTTP-Server-2.4.50-CVE-2021-42013-Exploitation.html
     source:MISC
     tags:

Refer to Information on External Sites

CVE InfomationExploits or more Infomation
mitreEXPLOIT DATABASE
NVD0day.today
vulmon.comgithub
CVE DetailsTwitter
JVN ENG JPN
Reconshell

Software Tag: Apache(1 tweets)



List of frequently cited URLs

URLNum of Times Referred to
https://piyolog.hatenadiary.jp/entry/2021/10/10/03183411
https://www.vulnmachines.com10
https://twitter.com/USCERT_gov/status/14462085333562368057
https://security.sios.com/vulnerability/apache-security-vul...7
https://thehackernews.com/2021/10/new-patch-released-for-ac...7
https://www.tenable.com/blog/cve-2021-41773-path-traversal-...6
https://bit.ly/3FnTtIt5
https://www.nri-secure.co.jp/blog/apache-http-server-vulner...5
https://httpd.apache.org/security/vulnerabilities_24.html4
https://blogs.juniper.net/en-us/enterprise-cloud-and-transf...4
https://eng-blog.iij.ad.jp/archives/109874
https://blog.segu-info.com.ar/2021/10/path-traversal-critic...4
https://packetstormsecurity.com/files/1650894
https://ift.tt/30cUova3
https://github.com/rapid7/metasploit-framework/pull/157543
https://isc.sans.edu/diary/rss/279403
https://tryhackme.com/room/cve2021417733
https://www.ipa.go.jp/security/ciadr/vul/alert20211006.html3
https://www.scutum.jp/information/technical_articles/index....3
https://b.hatena.ne.jp/entry?url=https%3A%2F%2Fpiyolog.hate...3
https://blog.qualys.com/vulnerabilities-threat-research/202...3
https://www.jpcert.or.jp/at/2021/at210043.html3
https://wizsafe.iij.ad.jp/2021/10/1285/3
https://www.marketscreener.com/quote/stock/QUALYS-INC-11612...3

Information from Twitter

User URL Info Source Date
MachinaRecord https://codebook.machinarecord.com/threatreport/25714 Source MachinaRecord    1630061794562830336 2023/02/27
HackingTeam1 https://github.com/walnutsecurity/cve-2021-42013 Source HackingTeam1     1642447062162722817 2023/04/02

List of frequently cited URLs

URLNum of Times Referred to
piyolog.hatenadiary.jp11
www.vulnmachines.com10
twitter.com7
security.sios.com7
thehackernews.com7
www.tenable.com6
bit.ly5
www.nri-secure.co.jp5
httpd.apache.org4
blogs.juniper.net4
eng-blog.iij.ad.jp4
blog.segu-info.com.ar4
packetstormsecurity.com4
ift.tt3
github.com3
isc.sans.edu3
tryhackme.com3
www.ipa.go.jp3
www.scutum.jp3
b.hatena.ne.jp3
blog.qualys.com3
www.jpcert.or.jp3
wizsafe.iij.ad.jp3
www.marketscreener.com3

Information from Twitter

User URL Info Source
MachinaRecord codebook.machinarecord.com Show Tweet
HackingTeam1 github.com Show Tweet

GitHub Search Results: Up to 10
NameURL
inbug-team/CVE-2021-41773_CVE-2021-42013 https://github.com/inbug-team/CVE-2021-41773_CVE-2021-42013
MrCl0wnLab/SimplesApachePathTraversal https://github.com/MrCl0wnLab/SimplesApachePathTraversal
Ls4ss/CVE-2021-41773_CVE-2021-42013 https://github.com/Ls4ss/CVE-2021-41773_CVE-2021-42013
im-hanzou/apachrot https://github.com/im-hanzou/apachrot
andrea-mattioli/apache-exploit-CVE-2021-42013 https://github.com/andrea-mattioli/apache-exploit-CVE-2021-42013
Vulnmachines/cve-2021-42013 https://github.com/Vulnmachines/cve-2021-42013
Zeop-CyberSec/apache_normalize_path https://github.com/Zeop-CyberSec/apache_normalize_path
vulf/CVE-2021-41773_42013 https://github.com/vulf/CVE-2021-41773_42013
cgddgc/CVE-2021-41773-42013 https://github.com/cgddgc/CVE-2021-41773-42013
5gstudent/cve-2021-41773-and-cve-2021-42013 https://github.com/5gstudent/cve-2021-41773-and-cve-2021-42013

GitHub Search Results: Up to 10
NameURL
inbug-team/CVE-2021-41773_CVE-2021-42013 github.com
MrCl0wnLab/SimplesApachePathTraversal github.com
Ls4ss/CVE-2021-41773_CVE-2021-42013 github.com
im-hanzou/apachrot github.com
andrea-mattioli/apache-exploit-CVE-2021-42013 github.com
Vulnmachines/cve-2021-42013 github.com
Zeop-CyberSec/apache_normalize_path github.com
vulf/CVE-2021-41773_42013 github.com
cgddgc/CVE-2021-41773-42013 github.com
5gstudent/cve-2021-41773-and-cve-2021-42013 github.com

2023/04/02 Score : 0
Added Har-sia Database : 2021/10/08
Last Modified : 2023/04/02
Highest Scored Date : 2021/10/08
Highest Score : 128