CVE-2021-42013

Scores

EPSS Score

0.9443

CVSS

3.x 9.8

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

All CVSS Scores

CVSS 4.0
0.0
CVSS 3.x
9.8

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

CVSS 2.0
7.5

Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P

Description

Было обнаружено, что исправление для CVE-2021-41773 в Apache HTTP Server 2.4.50 было недостаточным. Злоумышленник может использовать атаку обхода пути для сопоставления URL-адресов с файлами за пределами каталогов, настроенных директивами, подобными Alias. Если файлы за пределами этих каталогов не защищены обычной конфигурацией по умолчанию "require all denied", эти запросы могут быть успешными. Если CGI-скрипты также включены для этих псевдонимных путей, это может привести к удаленному выполнению кода. Эта проблема затрагивает только Apache 2.4.49 и Apache 2.4.50, а не более ранние версии.

Sources

debiannvdubuntu

CWEs

CWE-22

Related Vulnerabilities

Exploits

Exploit ID: 50406

Source: exploitdb

URL: https://www.exploit-db.com/exploits/50406

Exploit ID: 50446

Source: exploitdb

URL: https://www.exploit-db.com/exploits/50446

Exploit ID: 50512

Source: exploitdb

URL: https://www.exploit-db.com/exploits/50512

Exploit ID: CVE-2021-42013

Source: github-poc

URL: https://github.com/asepsaepdin/CVE-2021-42013

Reference Links

Vulnerable Software

Type: Configuration

Product: apache2

Operating System: ubuntu bionic 18.04

Trait:
{
  "unaffected": true
}

Source: ubuntu

Type: Configuration

Product: apache2

Operating System: ubuntu focal 20.04

Trait:
{
  "unaffected": true
}

Source: ubuntu

Type: Configuration

Product: apache2

Operating System: ubuntu hirsute 21.04

Trait:
{
  "unaffected": true
}

Source: ubuntu

Type: Configuration

Product: apache2

Operating System: ubuntu impish 21.10

Trait:
{
  "unaffected": true
}

Source: ubuntu

Type: Configuration

Product: apache2

Operating System: ubuntu jammy 22.04

Trait:
{
  "unaffected": true
}

Source: ubuntu

Type: Configuration

Product: apache2

Operating System: ubuntu trusty 14.04

Trait:
{
  "unfixed": true
}

Source: ubuntu

Type: Configuration

Product: apache2

Operating System: ubuntu xenial 16.04

Trait:
{
  "unfixed": true
}

Source: ubuntu

Type: Configuration

Product: apache2

Operating System: debian

Trait:
{
  "fixed": "2.4.51-1"
}

Source: debian

Type: Configuration

Product: apache2

Operating System: debian bullseye 11

Trait:
{
  "unaffected": true
}

Source: debian

Type: Configuration

Product: apache2

Operating System: debian buster 10

Trait:
{
  "unaffected": true
}

Source: debian

Type: Configuration

Product: apache2

Operating System: debian stretch 9

Trait:
{
  "unaffected": true
}

Source: debian

Type: Configuration

Vendor: apache

Product: http_server

Operating System: * * *

Trait:
{
  "cpe_match": [
    {
      "cpe23uri": "cpe:2.3:a:apache:http_server:2.4.49:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:apache:http_server:2.4.50:*:*:*:*:*:*:*",
      "vulnerable": true
    }
  ],
  "operator": "OR"
}

Source: nvd

Type: Configuration

Vendor: fedoraproject

Product: fedora

Operating System: * * *

Trait:
{
  "cpe_match": [
    {
      "cpe23uri": "cpe:2.3:o:fedoraproject:fedora:34:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:o:fedoraproject:fedora:35:*:*:*:*:*:*:*",
      "vulnerable": true
    }
  ],
  "operator": "OR"
}

Source: nvd

Type: Configuration

Vendor: netapp

Product: cloud_backup

Operating System: * * *

Trait:
{
  "cpe_match": [
    {
      "cpe23uri": "cpe:2.3:a:netapp:cloud_backup:-:*:*:*:*:*:*:*",
      "vulnerable": true
    }
  ],
  "operator": "OR"
}

Source: nvd

Type: Configuration

Vendor: oracle

Product: instantis_enterprisetrack

Operating System: * * *

Trait:
{
  "cpe_match": [
    {
      "cpe23uri": "cpe:2.3:a:oracle:instantis_enterprisetrack:17.1:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:oracle:instantis_enterprisetrack:17.2:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:oracle:instantis_enterprisetrack:17.3:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:oracle:jd_edwards_enterpriseone_tools:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "9.2.6.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:oracle:secure_backup:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "18.1.0.1.0",
      "vulnerable": true
    }
  ],
  "operator": "OR"
}

Source: nvd

Type: Configuration

Vendor: oracle

Product: jd_edwards_enterpriseone_tools

Operating System: * * *

Trait:
{
  "cpe_match": [
    {
      "cpe23uri": "cpe:2.3:a:oracle:instantis_enterprisetrack:17.1:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:oracle:instantis_enterprisetrack:17.2:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:oracle:instantis_enterprisetrack:17.3:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:oracle:jd_edwards_enterpriseone_tools:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "9.2.6.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:oracle:secure_backup:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "18.1.0.1.0",
      "vulnerable": true
    }
  ],
  "operator": "OR"
}

Source: nvd

Type: Configuration

Vendor: oracle

Product: secure_backup

Operating System: * * *

Trait:
{
  "cpe_match": [
    {
      "cpe23uri": "cpe:2.3:a:oracle:instantis_enterprisetrack:17.1:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:oracle:instantis_enterprisetrack:17.2:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:oracle:instantis_enterprisetrack:17.3:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:oracle:jd_edwards_enterpriseone_tools:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "9.2.6.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:oracle:secure_backup:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "18.1.0.1.0",
      "vulnerable": true
    }
  ],
  "operator": "OR"
}

Source: nvd