CVE-2021-42013

Description from NVD

It was found that the fix for CVE-2021-41773 in Apache HTTP Server 2.4.50 was insufficient. An attacker could use a path traversal attack to map URLs to files outside the directories configured by Alias-like directives. If files outside of these directories are not protected by the usual default configuration "require all denied", these requests can succeed. If CGI scripts are also enabled for these aliased pathes, this could allow for remote code execution. This issue only affects Apache 2.4.49 and Apache 2.4.50 and not earlier versions.

Information Acquisition Date:2021-11-02T20:18Z
CVSS 2.0: 7.5 HIGH CVSS 3.x: 9.8 CRITICAL

▼ CVSS3 Vec CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

▼ CVSS2 Vec AV:N/AC:L/Au:N/C:P/I:P/A:P

NVD References

 https://httpd.apache.org/security/vulnerabilities_24.html
     source:MISC
     tags:Vendor Advisory    
 [announce] 20211007 CVE-2021-42013: Path Traversal and Remote Code Execution in Apache HTTP Server 2.4.49 and 2.4.50 (incomplete fix of CVE-2021-41773)
     source:MLIST
     tags:Mailing List    
 [httpd-users] 20211007 [users@httpd] CVE-2021-42013: Path Traversal and Remote Code Execution in Apache HTTP Server 2.4.49 and 2.4.50 (incomplete fix of CVE-2021-41773)
     source:MLIST
     tags:Mailing List    
 [oss-security] 20211007 CVE-2021-42013: Path Traversal and Remote Code Execution in Apache HTTP Server 2.4.49 and 2.4.50 (incomplete fix of CVE-2021-41773)
     source:MLIST
     tags:Mailing List    Third Party Advisory    
 20211007 Apache HTTP Server Vulnerabilties: October 2021
     source:CISCO
     tags:Third Party Advisory    
 JVN#51106450
     source:JVN
     tags:Third Party Advisory    
 [oss-security] 20211008 Re: CVE-2021-42013: Path Traversal and Remote Code Execution in Apache HTTP Server 2.4.49 and 2.4.50 (incomplete fix of CVE-2021-41773)
     source:MLIST
     tags:Mailing List    Third Party Advisory    
 [httpd-cvs] 20211008 [httpd-site] branch main updated: * Align with CVE-2021-42013 based on the latest findings
     source:MLIST
     tags:Mailing List    Vendor Advisory    
 [oss-security] 20211008 Re: CVE-2021-42013: Path Traversal and Remote Code Execution in Apache HTTP Server 2.4.49 and 2.4.50 (incomplete fix of CVE-2021-41773)
     source:MLIST
     tags:Mailing List    Third Party Advisory    
 [oss-security] 20211008 Re: CVE-2021-42013: Path Traversal and Remote Code Execution in Apache HTTP Server 2.4.49 and 2.4.50 (incomplete fix of CVE-2021-41773)
     source:MLIST
     tags:Mailing List    Third Party Advisory    
 [oss-security] 20211008 Re: CVE-2021-42013: Path Traversal and Remote Code Execution in Apache HTTP Server 2.4.49 and 2.4.50 (incomplete fix of CVE-2021-41773)
     source:MLIST
     tags:Mailing List    Third Party Advisory    
 [oss-security] 20211008 Re: CVE-2021-42013: Path Traversal and Remote Code Execution in Apache HTTP Server 2.4.49 and 2.4.50 (incomplete fix of CVE-2021-41773)
     source:MLIST
     tags:Mailing List    Third Party Advisory    
 [oss-security] 20211008 Re: CVE-2021-42013: Path Traversal and Remote Code Execution in Apache HTTP Server 2.4.49 and 2.4.50 (incomplete fix of CVE-2021-41773)
     source:MLIST
     tags:Mailing List    Third Party Advisory    
 [oss-security] 20211009 Re: CVE-2021-42013: Path Traversal and Remote Code Execution in Apache HTTP Server 2.4.49 and 2.4.50 (incomplete fix of CVE-2021-41773)
     source:MLIST
     tags:Mailing List    Third Party Advisory    
 [oss-security] 20211011 Re: CVE-2021-42013: Path Traversal and Remote Code Execution in Apache HTTP Server 2.4.49 and 2.4.50 (incomplete fix of CVE-2021-41773)
     source:MLIST
     tags:Mailing List    Third Party Advisory    
 FEDORA-2021-2a10bc68a4
     source:FEDORA
     tags:Mailing List    Third Party Advisory    
 http://packetstormsecurity.com/files/164501/Apache-HTTP-Server-2.4.50-Path-Traversal-Code-Execution.html
     source:MISC
     tags:Exploit    Third Party Advisory    
 FEDORA-2021-aaf90ef84a
     source:FEDORA
     tags:Mailing List    
 [oss-security] 20211015 Re: CVE-2021-42013: Path Traversal and Remote Code Execution in Apache HTTP Server 2.4.49 and 2.4.50 (incomplete fix of CVE-2021-41773)
     source:MLIST
     tags:
 [oss-security] 20211016 Re: CVE-2021-42013: Path Traversal and Remote Code Execution in Apache HTTP Server 2.4.49 and 2.4.50 (incomplete fix of CVE-2021-41773)
     source:MLIST
     tags:
 http://packetstormsecurity.com/files/164609/Apache-HTTP-Server-2.4.50-Remote-Code-Execution.html
     source:MISC
     tags:
 http://packetstormsecurity.com/files/164629/Apache-2.4.49-2.4.50-Traversal-Remote-Code-Execution.html
     source:MISC
     tags:
 https://security.netapp.com/advisory/ntap-20211029-0009/
     source:CONFIRM
     tags:

Refer to Information on External Sites

CVE InfomationExploits or more Infomation
mitreEXPLOIT DATABASE
NVD0day.today
vulmon.comgithub
CVE DetailsTwitter
JVN ENG JPN
Reconshell

Software Tag: Apache(277 tweets) Apple(2 tweets) Linux(4 tweets) PHP(1 tweets) Unix(2 tweets) Windows(3 tweets) iOS(6 tweets)



List of frequently cited URLs

URLNum of Times Referred to
https://httpd.apache.org/security/vulnerabilities_24.html29
https://piyolog.hatenadiary.jp/entry/2021/10/10/03183425
https://tryhackme.com/room/cve20214177319
https://wizsafe.iij.ad.jp/2021/10/1285/18
https://bit.ly/3FnTtIt9
https://www.jpcert.or.jp/at/2021/at210043.html8
https://eng-blog.iij.ad.jp/archives/109878
https://security.sios.com/vulnerability/apache-security-vul...7
https://thehackernews.com/2021/10/new-patch-released-for-ac...7
https://www.ipa.go.jp/security/ciadr/vul/alert20211006.html6
https://blog.qualys.com/vulnerabilities-threat-research/202...6
https://www.tenable.com/blog/cve-2021-41773-path-traversal-...6
https://www.nri-secure.co.jp/blog/apache-http-server-vulner...5
https://twitter.com/USCERT_gov/status/14462085333562368054
https://blogs.juniper.net/en-us/enterprise-cloud-and-transf...4
https://blog.segu-info.com.ar/2021/10/path-traversal-critic...4
https://ift.tt/30cUova3
https://github.com/rapid7/metasploit-framework/pull/157543
https://isc.sans.edu/diary/rss/279403
https://www.scutum.jp/information/technical_articles/index....3
https://b.hatena.ne.jp/entry?url=https%3A%2F%2Fpiyolog.hate...3
https://www.marketscreener.com/quote/stock/QUALYS-INC-11612...3

▼ Show Information from Twitter(421)


List of frequently cited URLs

URLNum of Times Referred to
httpd.apache.org29
piyolog.hatenadiary.jp25
tryhackme.com19
wizsafe.iij.ad.jp18
bit.ly9
www.jpcert.or.jp8
eng-blog.iij.ad.jp8
security.sios.com7
thehackernews.com7
www.ipa.go.jp6
blog.qualys.com6
www.tenable.com6
www.nri-secure.co.jp5
twitter.com4
blogs.juniper.net4
blog.segu-info.com.ar4
ift.tt3
github.com3
isc.sans.edu3
www.scutum.jp3
b.hatena.ne.jp3
www.marketscreener.com3

▼ Show Information from Twitter(421)


GitHub Search Results: Up to 10
NameURL
inbug-team/CVE-2021-41773_CVE-2021-42013 https://github.com/inbug-team/CVE-2021-41773_CVE-2021-42013
MrCl0wnLab/SimplesApachePathTraversal https://github.com/MrCl0wnLab/SimplesApachePathTraversal
Ls4ss/CVE-2021-41773_CVE-2021-42013 https://github.com/Ls4ss/CVE-2021-41773_CVE-2021-42013
im-hanzou/apachrot https://github.com/im-hanzou/apachrot
andrea-mattioli/apache-exploit-CVE-2021-42013 https://github.com/andrea-mattioli/apache-exploit-CVE-2021-42013
Vulnmachines/cve-2021-42013 https://github.com/Vulnmachines/cve-2021-42013
Zeop-CyberSec/apache_normalize_path https://github.com/Zeop-CyberSec/apache_normalize_path
vulf/CVE-2021-41773_42013 https://github.com/vulf/CVE-2021-41773_42013
cgddgc/CVE-2021-41773-42013 https://github.com/cgddgc/CVE-2021-41773-42013
5gstudent/cve-2021-41773-and-cve-2021-42013 https://github.com/5gstudent/cve-2021-41773-and-cve-2021-42013

GitHub Search Results: Up to 10
NameURL
inbug-team/CVE-2021-41773_CVE-2021-42013 github.com
MrCl0wnLab/SimplesApachePathTraversal github.com
Ls4ss/CVE-2021-41773_CVE-2021-42013 github.com
im-hanzou/apachrot github.com
andrea-mattioli/apache-exploit-CVE-2021-42013 github.com
Vulnmachines/cve-2021-42013 github.com
Zeop-CyberSec/apache_normalize_path github.com
vulf/CVE-2021-41773_42013 github.com
cgddgc/CVE-2021-41773-42013 github.com
5gstudent/cve-2021-41773-and-cve-2021-42013 github.com

2021/11/25 Score : 1
Added Har-sia Database : 2021/10/08
Last Modified : 2021/11/25
Highest Scored Date : 2021/10/08
Highest Score : 128