CVE-2021-42013

Scores

EPSS

0.944High94.4%
0%20%40%60%80%100%

Percentile: 94.4%

CVSS

8.1High3.x
0246810

CVSS Score: 8.1/10

All CVSS Scores

CVSS 3.x
8.1

Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H

CVSS 2.0
7.5

Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P

Description

It was found that the fix for CVE-2021-41773 in Apache HTTP Server 2.4.50 was insufficient. An attacker could use a path traversal attack to map URLs to files outside the directories configured by Alias-like directives. If files outside of these directories are not protected by the usual default configuration “require all denied”, these requests can succeed. If CGI scripts are also enabled for these aliased pathes, this could allow for remote code execution. This issue only affects Apache 2.4.49 and Apache 2.4.50 and not earlier versions.

Scaner-VS 7 — a modern vulnerability management solution

Uses this database for vulnerability detection. High-speed search, cross-platform, advanced configuration audit, and flexible filtering. Suitable for organizations of any size.
Learn more about Scaner-VS 7

Sources

debiannvdubuntu

CWEs

CWE-22

Related Vulnerabilities

Exploits

Exploit ID: 50406

Source: exploitdb

URL: https://www.exploit-db.com/exploits/50406

Exploit ID: 50446

Source: exploitdb

URL: https://www.exploit-db.com/exploits/50446

Exploit ID: 50512

Source: exploitdb

URL: https://www.exploit-db.com/exploits/50512

Exploit ID: CVE-2021-42013

Source: github-poc

URL: https://github.com/asepsaepdin/CVE-2021-42013

Vulnerable Software (17)

Type: Configuration

Product: apache2

Operating System: ubuntu bionic 18.04

Trait:
{
  "unaffected": true
}

Source: ubuntu

Type: Configuration

Product: apache2

Operating System: ubuntu focal 20.04

Trait:
{
  "unaffected": true
}

Source: ubuntu

Type: Configuration

Product: apache2

Operating System: ubuntu hirsute 21.04

Trait:
{
  "unaffected": true
}

Source: ubuntu

Type: Configuration

Product: apache2

Operating System: ubuntu impish 21.10

Trait:
{
  "unaffected": true
}

Source: ubuntu

Type: Configuration

Product: apache2

Operating System: ubuntu jammy 22.04

Trait:
{
  "unaffected": true
}

Source: ubuntu

Type: Configuration

Product: apache2

Operating System: ubuntu trusty 14.04

Trait:
{
  "unfixed": true
}

Source: ubuntu

Type: Configuration

Product: apache2

Operating System: ubuntu xenial 16.04

Trait:
{
  "unfixed": true
}

Source: ubuntu

Type: Configuration

Product: apache2

Operating System: debian

Trait:
{
  "fixed": "2.4.51-1"
}

Source: debian

Type: Configuration

Product: apache2

Operating System: debian bullseye 11

Trait:
{
  "unaffected": true
}

Source: debian

Type: Configuration

Product: apache2

Operating System: debian buster 10

Trait:
{
  "unaffected": true
}

Source: debian