2021-10-05 23:14:32 +02:00
[
{
"id" : 413890827 ,
"name" : "cve-2021-41773" ,
"full_name" : "Vulnmachines\/cve-2021-41773" ,
"owner" : {
"login" : "Vulnmachines" ,
"id" : 79006904 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/79006904?v=4" ,
"html_url" : "https:\/\/github.com\/Vulnmachines"
} ,
"html_url" : "https:\/\/github.com\/Vulnmachines\/cve-2021-41773" ,
"description" : "CVE-2021-41773 Path Traversal vulnerability in Apache 2.4.49." ,
"fork" : false ,
"created_at" : "2021-10-05T16:13:38Z" ,
2022-02-16 13:14:14 +01:00
"updated_at" : "2022-02-16T09:56:16Z" ,
2021-12-07 19:15:07 +01:00
"pushed_at" : "2021-12-07T12:48:44Z" ,
2022-02-16 13:14:14 +01:00
"stargazers_count" : 35 ,
"watchers_count" : 35 ,
2022-01-13 19:18:29 +01:00
"forks_count" : 11 ,
2021-10-05 23:14:32 +02:00
"allow_forking" : true ,
2021-10-06 23:13:51 +02:00
"is_template" : false ,
"topics" : [ ] ,
2021-10-05 23:14:32 +02:00
"visibility" : "public" ,
2022-01-13 19:18:29 +01:00
"forks" : 11 ,
2022-02-16 13:14:14 +01:00
"watchers" : 35 ,
2021-10-05 23:14:32 +02:00
"score" : 0
} ,
{
"id" : 413916846 ,
"name" : "PoC-CVE-2021-41773" ,
"full_name" : "iilegacyyii\/PoC-CVE-2021-41773" ,
"owner" : {
"login" : "iilegacyyii" ,
"id" : 68760809 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/68760809?v=4" ,
"html_url" : "https:\/\/github.com\/iilegacyyii"
} ,
"html_url" : "https:\/\/github.com\/iilegacyyii\/PoC-CVE-2021-41773" ,
"description" : null ,
"fork" : false ,
"created_at" : "2021-10-05T17:30:43Z" ,
2022-02-20 01:14:10 +01:00
"updated_at" : "2022-02-19T20:08:56Z" ,
2021-11-24 19:13:10 +01:00
"pushed_at" : "2021-11-24T12:57:46Z" ,
2022-02-20 01:14:10 +01:00
"stargazers_count" : 39 ,
"watchers_count" : 39 ,
2022-02-01 13:14:29 +01:00
"forks_count" : 37 ,
2021-10-05 23:14:32 +02:00
"allow_forking" : true ,
2021-10-06 23:13:51 +02:00
"is_template" : false ,
2021-11-24 19:13:10 +01:00
"topics" : [
"apache" ,
"cve" ,
"lfi" ,
"poc" ,
"rce"
] ,
2021-10-05 23:14:32 +02:00
"visibility" : "public" ,
2022-02-01 13:14:29 +01:00
"forks" : 37 ,
2022-02-20 01:14:10 +01:00
"watchers" : 39 ,
2021-10-05 23:14:32 +02:00
"score" : 0
} ,
2021-10-06 05:15:02 +02:00
{
"id" : 414043746 ,
2021-10-09 23:12:27 +02:00
"name" : "CVE-2021-41773_CVE-2021-42013" ,
"full_name" : "Ls4ss\/CVE-2021-41773_CVE-2021-42013" ,
2021-10-06 05:15:02 +02:00
"owner" : {
2021-10-06 23:13:51 +02:00
"login" : "Ls4ss" ,
2021-10-06 05:15:02 +02:00
"id" : 25537761 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/25537761?v=4" ,
2021-10-06 23:13:51 +02:00
"html_url" : "https:\/\/github.com\/Ls4ss"
2021-10-06 05:15:02 +02:00
} ,
2021-10-09 23:12:27 +02:00
"html_url" : "https:\/\/github.com\/Ls4ss\/CVE-2021-41773_CVE-2021-42013" ,
"description" : "Apache HTTP Server 2.4.49, 2.4.50 - Path Traversal & RCE" ,
2021-10-06 05:15:02 +02:00
"fork" : false ,
"created_at" : "2021-10-06T02:28:41Z" ,
2022-02-22 19:17:26 +01:00
"updated_at" : "2022-02-22T16:06:38Z" ,
2021-12-23 01:13:39 +01:00
"pushed_at" : "2021-12-22T23:54:18Z" ,
2022-02-22 19:17:26 +01:00
"stargazers_count" : 17 ,
"watchers_count" : 17 ,
2021-12-23 01:13:39 +01:00
"forks_count" : 8 ,
2021-10-06 05:15:02 +02:00
"allow_forking" : true ,
2021-10-06 23:13:51 +02:00
"is_template" : false ,
"topics" : [
"apache" ,
"cve" ,
"exploit" ,
"payload" ,
"pentest" ,
"rce"
] ,
2021-10-06 05:15:02 +02:00
"visibility" : "public" ,
2021-12-23 01:13:39 +01:00
"forks" : 8 ,
2022-02-22 19:17:26 +01:00
"watchers" : 17 ,
2021-10-06 05:15:02 +02:00
"score" : 0
} ,
2021-10-06 23:13:51 +02:00
{
"id" : 414256797 ,
"name" : "apache_normalize_path" ,
"full_name" : "Zeop-CyberSec\/apache_normalize_path" ,
"owner" : {
"login" : "Zeop-CyberSec" ,
"id" : 68154603 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/68154603?v=4" ,
"html_url" : "https:\/\/github.com\/Zeop-CyberSec"
} ,
"html_url" : "https:\/\/github.com\/Zeop-CyberSec\/apache_normalize_path" ,
2021-10-08 17:13:03 +02:00
"description" : "Metasploit-Framework modules (scanner and exploit) for the CVE-2021-41773 and CVE-2021-42013 (Path Traversal in Apache 2.4.49\/2.4.50)" ,
2021-10-06 23:13:51 +02:00
"fork" : false ,
"created_at" : "2021-10-06T14:58:27Z" ,
2021-11-08 01:12:56 +01:00
"updated_at" : "2021-11-07T19:19:39Z" ,
2021-10-21 23:13:05 +02:00
"pushed_at" : "2021-10-21T18:51:00Z" ,
2021-11-08 01:12:56 +01:00
"stargazers_count" : 12 ,
"watchers_count" : 12 ,
"forks_count" : 4 ,
2021-10-06 23:13:51 +02:00
"allow_forking" : true ,
"is_template" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
2021-11-08 01:12:56 +01:00
"forks" : 4 ,
"watchers" : 12 ,
2021-10-06 23:13:51 +02:00
"score" : 0
} ,
{
2021-10-07 23:13:16 +02:00
"id" : 414376599 ,
"name" : "CVE-2021-41773" ,
"full_name" : "AssassinUKG\/CVE-2021-41773" ,
2021-10-06 23:13:51 +02:00
"owner" : {
2021-10-07 23:13:16 +02:00
"login" : "AssassinUKG" ,
"id" : 5285547 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/5285547?v=4" ,
"html_url" : "https:\/\/github.com\/AssassinUKG"
2021-10-06 23:13:51 +02:00
} ,
2021-10-07 23:13:16 +02:00
"html_url" : "https:\/\/github.com\/AssassinUKG\/CVE-2021-41773" ,
"description" : "Apache 2.4.49" ,
"fork" : false ,
"created_at" : "2021-10-06T21:37:18Z" ,
2021-10-21 05:12:58 +02:00
"updated_at" : "2021-10-20T23:04:09Z" ,
"pushed_at" : "2021-10-20T23:04:06Z" ,
2021-10-10 23:13:34 +02:00
"stargazers_count" : 3 ,
"watchers_count" : 3 ,
"forks_count" : 1 ,
2021-10-07 23:13:16 +02:00
"allow_forking" : true ,
"is_template" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
2021-10-10 23:13:34 +02:00
"forks" : 1 ,
"watchers" : 3 ,
2021-10-07 23:13:16 +02:00
"score" : 0
} ,
2021-10-08 05:12:49 +02:00
{
"id" : 414804962 ,
"name" : "CVE-2021-41773" ,
"full_name" : "shellreaper\/CVE-2021-41773" ,
"owner" : {
"login" : "shellreaper" ,
"id" : 76930483 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/76930483?v=4" ,
"html_url" : "https:\/\/github.com\/shellreaper"
} ,
"html_url" : "https:\/\/github.com\/shellreaper\/CVE-2021-41773" ,
2021-11-12 01:13:05 +01:00
"description" : "This is a simple POC for Apache\/2.4.49 Path Traversal Vulnerability" ,
2021-10-08 05:12:49 +02:00
"fork" : false ,
"created_at" : "2021-10-08T01:13:33Z" ,
2021-11-12 01:13:05 +01:00
"updated_at" : "2021-11-12T00:05:10Z" ,
"pushed_at" : "2021-11-12T00:03:34Z" ,
2021-10-10 23:13:34 +02:00
"stargazers_count" : 4 ,
"watchers_count" : 4 ,
"forks_count" : 2 ,
2021-10-08 11:13:11 +02:00
"allow_forking" : true ,
"is_template" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
2021-10-10 23:13:34 +02:00
"forks" : 2 ,
"watchers" : 4 ,
2021-10-08 11:13:11 +02:00
"score" : 0
} ,
2021-10-25 11:15:13 +02:00
{
"id" : 414878778 ,
"name" : "CVE-2021-41773" ,
"full_name" : "corelight\/CVE-2021-41773" ,
"owner" : {
"login" : "corelight" ,
"id" : 21672558 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/21672558?v=4" ,
"html_url" : "https:\/\/github.com\/corelight"
} ,
"html_url" : "https:\/\/github.com\/corelight\/CVE-2021-41773" ,
"description" : "A Zeek package which raises notices for Path Traversal\/RCE in Apache HTTP Server 2.4.49 (CVE-2021-41773) and 2.4.50 (CVE-2021-42013)" ,
"fork" : false ,
"created_at" : "2021-10-08T06:54:27Z" ,
2021-10-28 11:15:29 +02:00
"updated_at" : "2021-10-28T05:48:41Z" ,
"pushed_at" : "2021-10-28T05:55:41Z" ,
2021-10-25 17:14:27 +02:00
"stargazers_count" : 1 ,
"watchers_count" : 1 ,
2021-12-15 19:14:01 +01:00
"forks_count" : 1 ,
2021-10-25 11:15:13 +02:00
"allow_forking" : true ,
"is_template" : false ,
2021-10-08 11:13:11 +02:00
"topics" : [ ] ,
"visibility" : "public" ,
2021-10-10 23:13:34 +02:00
"forks" : 1 ,
"watchers" : 1 ,
2021-10-08 05:12:49 +02:00
"score" : 0
2021-10-08 23:12:47 +02:00
} ,
2021-10-15 17:14:24 +02:00
{
"id" : 417461813 ,
"name" : "apache-httpd-path-traversal-checker" ,
"full_name" : "theLSA\/apache-httpd-path-traversal-checker" ,
"owner" : {
"login" : "theLSA" ,
"id" : 28248956 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/28248956?v=4" ,
"html_url" : "https:\/\/github.com\/theLSA"
} ,
"html_url" : "https:\/\/github.com\/theLSA\/apache-httpd-path-traversal-checker" ,
"description" : "apache httpd path traversal checker(CVE-2021-41773 \/ CVE-2021-42013)" ,
"fork" : false ,
"created_at" : "2021-10-15T10:38:44Z" ,
2022-01-31 13:14:22 +01:00
"updated_at" : "2022-01-31T07:15:01Z" ,
2021-10-16 17:12:34 +02:00
"pushed_at" : "2021-10-16T10:28:23Z" ,
2022-01-31 13:14:22 +01:00
"stargazers_count" : 6 ,
"watchers_count" : 6 ,
2021-12-23 07:15:07 +01:00
"forks_count" : 4 ,
2021-10-15 17:14:24 +02:00
"allow_forking" : true ,
"is_template" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
2021-12-23 07:15:07 +01:00
"forks" : 4 ,
2022-01-31 13:14:22 +01:00
"watchers" : 6 ,
2021-10-13 23:12:52 +02:00
"score" : 0
2021-10-16 05:12:36 +02:00
} ,
{
"id" : 417643516 ,
"name" : "CVE-2021-41773" ,
"full_name" : "LudovicPatho\/CVE-2021-41773" ,
"owner" : {
"login" : "LudovicPatho" ,
"id" : 26960886 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/26960886?v=4" ,
"html_url" : "https:\/\/github.com\/LudovicPatho"
} ,
"html_url" : "https:\/\/github.com\/LudovicPatho\/CVE-2021-41773" ,
"description" : "The first vulnerability with the CVE identifier CVE-2021-41773 is a path traversal flaw that exists in Apache HTTP Server 2.4.49." ,
"fork" : false ,
"created_at" : "2021-10-15T21:38:48Z" ,
2021-10-21 11:13:06 +02:00
"updated_at" : "2021-10-21T07:26:16Z" ,
"pushed_at" : "2021-10-21T07:26:13Z" ,
2021-10-16 05:12:36 +02:00
"stargazers_count" : 0 ,
"watchers_count" : 0 ,
2021-10-16 17:12:34 +02:00
"forks_count" : 1 ,
2021-10-16 05:12:36 +02:00
"allow_forking" : true ,
"is_template" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
2021-10-16 17:12:34 +02:00
"forks" : 1 ,
2021-10-16 05:12:36 +02:00
"watchers" : 0 ,
"score" : 0
} ,
2021-10-16 23:12:32 +02:00
{
"id" : 417869261 ,
"name" : "CVE-2021-41773_Honeypot" ,
"full_name" : "lopqto\/CVE-2021-41773_Honeypot" ,
"owner" : {
"login" : "lopqto" ,
"id" : 30213943 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/30213943?v=4" ,
"html_url" : "https:\/\/github.com\/lopqto"
} ,
"html_url" : "https:\/\/github.com\/lopqto\/CVE-2021-41773_Honeypot" ,
"description" : "Simple honeypot for CVE-2021-41773 vulnerability" ,
"fork" : false ,
"created_at" : "2021-10-16T15:30:34Z" ,
2021-10-17 11:12:40 +02:00
"updated_at" : "2021-10-17T08:13:10Z" ,
"pushed_at" : "2021-10-17T08:13:08Z" ,
2021-10-16 23:12:32 +02:00
"stargazers_count" : 0 ,
"watchers_count" : 0 ,
2021-10-17 05:13:26 +02:00
"forks_count" : 1 ,
2021-10-16 23:12:32 +02:00
"allow_forking" : true ,
"is_template" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
2021-10-17 05:13:26 +02:00
"forks" : 1 ,
2021-10-16 23:12:32 +02:00
"watchers" : 0 ,
"score" : 0
2021-10-18 17:13:29 +02:00
} ,
{
"id" : 418481558 ,
"name" : "CVE-2021-41773_42013" ,
"full_name" : "vulf\/CVE-2021-41773_42013" ,
"owner" : {
"login" : "vulf" ,
"id" : 37404408 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/37404408?v=4" ,
"html_url" : "https:\/\/github.com\/vulf"
} ,
"html_url" : "https:\/\/github.com\/vulf\/CVE-2021-41773_42013" ,
"description" : "Lab setup for CVE-2021-41773 (Apache httpd 2.4.49) and CVE-2021-42013 (Apache httpd 2.4.50)." ,
"fork" : false ,
"created_at" : "2021-10-18T12:01:58Z" ,
2021-12-10 07:14:52 +01:00
"updated_at" : "2021-12-10T06:09:44Z" ,
2021-10-18 17:13:29 +02:00
"pushed_at" : "2021-10-18T12:47:56Z" ,
2021-12-10 07:14:52 +01:00
"stargazers_count" : 1 ,
"watchers_count" : 1 ,
2021-10-20 11:13:01 +02:00
"forks_count" : 2 ,
2021-10-18 17:13:29 +02:00
"allow_forking" : true ,
"is_template" : false ,
"topics" : [
"apache" ,
"cve" ,
"cve-2021-41773" ,
"cve-2021-42013" ,
"httpd" ,
"lfi" ,
"penetration-testing" ,
"rce" ,
"security" ,
"vulnerable" ,
"web"
] ,
"visibility" : "public" ,
2021-10-20 11:13:01 +02:00
"forks" : 2 ,
2021-12-10 07:14:52 +01:00
"watchers" : 1 ,
2021-10-18 17:13:29 +02:00
"score" : 0
2021-10-20 05:12:40 +02:00
} ,
{
"id" : 419143683 ,
"name" : "CVE-2021-41773" ,
"full_name" : "cloudbyteelias\/CVE-2021-41773" ,
"owner" : {
"login" : "cloudbyteelias" ,
"id" : 44121417 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/44121417?v=4" ,
"html_url" : "https:\/\/github.com\/cloudbyteelias"
} ,
"html_url" : "https:\/\/github.com\/cloudbyteelias\/CVE-2021-41773" ,
"description" : "CVE-2021-41773 Docker lab" ,
"fork" : false ,
"created_at" : "2021-10-20T01:20:21Z" ,
2021-11-05 01:13:01 +01:00
"updated_at" : "2021-11-04T23:37:34Z" ,
2021-10-20 05:12:40 +02:00
"pushed_at" : "2021-10-20T01:21:34Z" ,
2021-11-05 01:13:01 +01:00
"stargazers_count" : 2 ,
"watchers_count" : 2 ,
2021-10-20 05:12:40 +02:00
"forks_count" : 1 ,
"allow_forking" : true ,
"is_template" : false ,
"topics" : [
"cve-2021-41773"
] ,
"visibility" : "public" ,
"forks" : 1 ,
2021-11-05 01:13:01 +01:00
"watchers" : 2 ,
2021-10-20 05:12:40 +02:00
"score" : 0
2021-10-20 17:14:45 +02:00
} ,
{
"id" : 419301010 ,
"name" : "CVE-2021-41773" ,
"full_name" : "qwutony\/CVE-2021-41773" ,
"owner" : {
"login" : "qwutony" ,
"id" : 45024645 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/45024645?v=4" ,
"html_url" : "https:\/\/github.com\/qwutony"
} ,
"html_url" : "https:\/\/github.com\/qwutony\/CVE-2021-41773" ,
"description" : null ,
"fork" : false ,
"created_at" : "2021-10-20T11:27:12Z" ,
"updated_at" : "2021-10-20T12:26:59Z" ,
"pushed_at" : "2021-10-20T12:26:56Z" ,
"stargazers_count" : 0 ,
"watchers_count" : 0 ,
"forks_count" : 0 ,
"allow_forking" : true ,
"is_template" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
"forks" : 0 ,
"watchers" : 0 ,
"score" : 0
} ,
{
"id" : 419369252 ,
"name" : "CVE-2021-41773" ,
2021-10-21 17:17:42 +02:00
"full_name" : "LayarKacaSiber\/CVE-2021-41773" ,
2021-10-20 17:14:45 +02:00
"owner" : {
2021-10-21 17:17:42 +02:00
"login" : "LayarKacaSiber" ,
2021-10-20 17:14:45 +02:00
"id" : 92864439 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/92864439?v=4" ,
2021-10-21 17:17:42 +02:00
"html_url" : "https:\/\/github.com\/LayarKacaSiber"
2021-10-20 17:14:45 +02:00
} ,
2021-10-21 17:17:42 +02:00
"html_url" : "https:\/\/github.com\/LayarKacaSiber\/CVE-2021-41773" ,
2021-10-20 17:14:45 +02:00
"description" : null ,
"fork" : false ,
"created_at" : "2021-10-20T14:41:15Z" ,
2021-10-23 17:14:20 +02:00
"updated_at" : "2021-10-23T13:15:51Z" ,
"pushed_at" : "2021-10-23T13:15:48Z" ,
2021-10-20 17:14:45 +02:00
"stargazers_count" : 0 ,
"watchers_count" : 0 ,
"forks_count" : 0 ,
"allow_forking" : true ,
"is_template" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
"forks" : 0 ,
"watchers" : 0 ,
"score" : 0
2021-10-22 17:13:08 +02:00
} ,
{
"id" : 420144635 ,
"name" : "CVE-2021-41773" ,
"full_name" : "BabyTeam1024\/CVE-2021-41773" ,
"owner" : {
"login" : "BabyTeam1024" ,
"id" : 74447452 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/74447452?v=4" ,
"html_url" : "https:\/\/github.com\/BabyTeam1024"
} ,
"html_url" : "https:\/\/github.com\/BabyTeam1024\/CVE-2021-41773" ,
"description" : null ,
"fork" : false ,
"created_at" : "2021-10-22T15:12:12Z" ,
2021-10-24 11:12:45 +02:00
"updated_at" : "2021-10-24T07:10:34Z" ,
2021-10-22 23:12:49 +02:00
"pushed_at" : "2021-10-22T15:23:56Z" ,
2021-10-24 11:12:45 +02:00
"stargazers_count" : 1 ,
"watchers_count" : 1 ,
"forks_count" : 1 ,
2021-10-22 17:13:08 +02:00
"allow_forking" : true ,
"is_template" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
2021-10-24 11:12:45 +02:00
"forks" : 1 ,
"watchers" : 1 ,
2021-10-22 17:13:08 +02:00
"score" : 0
2021-10-24 05:14:30 +02:00
} ,
2021-10-24 17:12:31 +02:00
{
"id" : 420407065 ,
"name" : "cve-2021-41773" ,
"full_name" : "walnutsecurity\/cve-2021-41773" ,
"owner" : {
"login" : "walnutsecurity" ,
"id" : 92915142 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/92915142?v=4" ,
"html_url" : "https:\/\/github.com\/walnutsecurity"
} ,
"html_url" : "https:\/\/github.com\/walnutsecurity\/cve-2021-41773" ,
2021-10-27 17:14:12 +02:00
"description" : "cve-2021-41773.py is a python script that will help in finding Path Traversal or Remote Code Execution vulnerability in Apache 2.4.49" ,
2021-10-24 17:12:31 +02:00
"fork" : false ,
"created_at" : "2021-10-23T12:31:53Z" ,
2021-11-25 13:13:16 +01:00
"updated_at" : "2021-11-25T09:32:45Z" ,
"pushed_at" : "2021-11-25T09:32:43Z" ,
2021-10-24 17:12:31 +02:00
"stargazers_count" : 0 ,
"watchers_count" : 0 ,
2021-10-26 05:14:05 +02:00
"forks_count" : 1 ,
2021-10-24 17:12:31 +02:00
"allow_forking" : true ,
"is_template" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
2021-10-26 05:14:05 +02:00
"forks" : 1 ,
2021-10-24 17:12:31 +02:00
"watchers" : 0 ,
"score" : 0
} ,
2021-10-24 05:14:30 +02:00
{
"id" : 420528447 ,
"name" : "CVE-2021-41773" ,
"full_name" : "TheLastVvV\/CVE-2021-41773" ,
"owner" : {
"login" : "TheLastVvV" ,
"id" : 71128830 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/71128830?v=4" ,
"html_url" : "https:\/\/github.com\/TheLastVvV"
} ,
"html_url" : "https:\/\/github.com\/TheLastVvV\/CVE-2021-41773" ,
"description" : "Poc CVE-2021-41773 - Apache 2.4.49 with CGI enabled" ,
"fork" : false ,
"created_at" : "2021-10-23T21:37:25Z" ,
"updated_at" : "2021-10-23T23:15:50Z" ,
"pushed_at" : "2021-10-23T21:50:36Z" ,
"stargazers_count" : 0 ,
"watchers_count" : 0 ,
"forks_count" : 0 ,
2021-11-30 13:14:49 +01:00
"allow_forking" : true ,
"is_template" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
"forks" : 0 ,
"watchers" : 0 ,
"score" : 0
} ,
{
"id" : 421138366 ,
"name" : "CVE-2021-41773" ,
"full_name" : "MazX0p\/CVE-2021-41773" ,
"owner" : {
"login" : "MazX0p" ,
"id" : 54814433 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/54814433?v=4" ,
"html_url" : "https:\/\/github.com\/MazX0p"
} ,
"html_url" : "https:\/\/github.com\/MazX0p\/CVE-2021-41773" ,
"description" : null ,
"fork" : false ,
"created_at" : "2021-10-25T18:21:43Z" ,
"updated_at" : "2021-10-25T18:39:13Z" ,
"pushed_at" : "2021-10-25T18:39:11Z" ,
"stargazers_count" : 0 ,
"watchers_count" : 0 ,
"forks_count" : 0 ,
2021-10-24 05:14:30 +02:00
"allow_forking" : true ,
"is_template" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
"forks" : 0 ,
"watchers" : 0 ,
"score" : 0
2021-10-25 23:13:03 +02:00
} ,
2021-10-26 05:14:05 +02:00
{
"id" : 421191229 ,
"name" : "Scanner-CVE-2021-41773" ,
"full_name" : "vida00\/Scanner-CVE-2021-41773" ,
"owner" : {
"login" : "vida00" ,
"id" : 77762068 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/77762068?v=4" ,
"html_url" : "https:\/\/github.com\/vida00"
} ,
"html_url" : "https:\/\/github.com\/vida00\/Scanner-CVE-2021-41773" ,
"description" : "A automatic scanner to apache 2.4.49" ,
"fork" : false ,
"created_at" : "2021-10-25T21:34:08Z" ,
"updated_at" : "2021-10-25T22:17:23Z" ,
"pushed_at" : "2021-10-25T22:17:21Z" ,
"stargazers_count" : 0 ,
"watchers_count" : 0 ,
"forks_count" : 0 ,
"allow_forking" : true ,
"is_template" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
"forks" : 0 ,
"watchers" : 0 ,
"score" : 0
2021-10-26 23:16:55 +02:00
} ,
{
"id" : 421530564 ,
"name" : "CVE-2021-41773" ,
"full_name" : "mr-exo\/CVE-2021-41773" ,
"owner" : {
"login" : "mr-exo" ,
"id" : 76655540 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/76655540?v=4" ,
"html_url" : "https:\/\/github.com\/mr-exo"
} ,
"html_url" : "https:\/\/github.com\/mr-exo\/CVE-2021-41773" ,
"description" : "Remote Code Execution exploit for Apache servers. Affected versions: Apache 2.4.49, Apache 2.4.50" ,
"fork" : false ,
"created_at" : "2021-10-26T17:56:25Z" ,
"updated_at" : "2021-10-26T18:04:45Z" ,
"pushed_at" : "2021-10-26T18:04:43Z" ,
"stargazers_count" : 0 ,
"watchers_count" : 0 ,
"forks_count" : 0 ,
"allow_forking" : true ,
"is_template" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
"forks" : 0 ,
"watchers" : 0 ,
"score" : 0
} ,
{
"id" : 421553366 ,
"name" : "CVE-2021-41773" ,
"full_name" : "Balgogan\/CVE-2021-41773" ,
"owner" : {
"login" : "Balgogan" ,
"id" : 88535377 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/88535377?v=4" ,
"html_url" : "https:\/\/github.com\/Balgogan"
} ,
"html_url" : "https:\/\/github.com\/Balgogan\/CVE-2021-41773" ,
"description" : "Ce programme permet de détecter une faille RCE sur les serveurs Apache 2.4.49 et Apache 2.4.50" ,
"fork" : false ,
"created_at" : "2021-10-26T19:11:28Z" ,
2022-02-22 19:17:26 +01:00
"updated_at" : "2022-02-22T16:05:15Z" ,
2021-11-11 07:14:53 +01:00
"pushed_at" : "2021-11-11T00:48:37Z" ,
2022-02-22 19:17:26 +01:00
"stargazers_count" : 11 ,
"watchers_count" : 11 ,
2021-11-20 01:13:28 +01:00
"forks_count" : 4 ,
2021-10-26 23:16:55 +02:00
"allow_forking" : true ,
"is_template" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
2021-11-20 01:13:28 +01:00
"forks" : 4 ,
2022-02-22 19:17:26 +01:00
"watchers" : 11 ,
2021-10-26 23:16:55 +02:00
"score" : 0
2021-10-29 11:15:04 +02:00
} ,
{
"id" : 422466104 ,
"name" : "CVE-2021-41773" ,
"full_name" : "wolf1892\/CVE-2021-41773" ,
"owner" : {
"login" : "wolf1892" ,
"id" : 24608781 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/24608781?v=4" ,
"html_url" : "https:\/\/github.com\/wolf1892"
} ,
"html_url" : "https:\/\/github.com\/wolf1892\/CVE-2021-41773" ,
"description" : "Setup vulnerable enviornment" ,
"fork" : false ,
"created_at" : "2021-10-29T06:31:57Z" ,
"updated_at" : "2021-10-29T06:33:41Z" ,
"pushed_at" : "2021-10-29T06:33:39Z" ,
"stargazers_count" : 0 ,
"watchers_count" : 0 ,
"forks_count" : 0 ,
"allow_forking" : true ,
"is_template" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
"forks" : 0 ,
"watchers" : 0 ,
"score" : 0
2021-11-05 01:13:01 +01:00
} ,
{
"id" : 424762276 ,
"name" : "CVE-2021-41773-Playground" ,
"full_name" : "Hydragyrum\/CVE-2021-41773-Playground" ,
"owner" : {
"login" : "Hydragyrum" ,
"id" : 4928181 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/4928181?v=4" ,
"html_url" : "https:\/\/github.com\/Hydragyrum"
} ,
"html_url" : "https:\/\/github.com\/Hydragyrum\/CVE-2021-41773-Playground" ,
"description" : "Some docker images to play with CVE-2021-41773 and CVE-2021-42013" ,
"fork" : false ,
"created_at" : "2021-11-04T22:52:44Z" ,
2022-01-11 13:16:14 +01:00
"updated_at" : "2022-01-11T09:06:38Z" ,
2021-11-05 01:13:01 +01:00
"pushed_at" : "2021-11-04T22:56:14Z" ,
2022-01-11 13:16:14 +01:00
"stargazers_count" : 5 ,
"watchers_count" : 5 ,
"forks_count" : 1 ,
2021-11-05 01:13:01 +01:00
"allow_forking" : true ,
"is_template" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
2022-01-11 13:16:14 +01:00
"forks" : 1 ,
"watchers" : 5 ,
2021-11-05 01:13:01 +01:00
"score" : 0
2021-11-09 07:12:55 +01:00
} ,
{
"id" : 426066790 ,
"name" : "Apache-2.4.49-2.4.50-Traversal-Remote-Code-Execution-Exploit" ,
"full_name" : "IcmpOff\/Apache-2.4.49-2.4.50-Traversal-Remote-Code-Execution-Exploit" ,
"owner" : {
"login" : "IcmpOff" ,
"id" : 71145797 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/71145797?v=4" ,
"html_url" : "https:\/\/github.com\/IcmpOff"
} ,
"html_url" : "https:\/\/github.com\/IcmpOff\/Apache-2.4.49-2.4.50-Traversal-Remote-Code-Execution-Exploit" ,
"description" : "This Metasploit module exploits an unauthenticated remote code execution vulnerability which exists in Apache version 2.4.49 (CVE-2021-41773). If files outside of the document root are not protected by ‘ require all denied’ and CGI has been explicitly enabled, it can be used to execute arbitrary commands. This vulnerability has been reintroduced in the Apache 2.4.50 fix (CVE-2021-42013)." ,
"fork" : false ,
"created_at" : "2021-11-09T02:38:13Z" ,
"updated_at" : "2021-11-09T02:42:52Z" ,
"pushed_at" : "2021-11-09T02:39:22Z" ,
"stargazers_count" : 0 ,
"watchers_count" : 0 ,
"forks_count" : 0 ,
"allow_forking" : true ,
"is_template" : false ,
"topics" : [
"apache" ,
"exploit" ,
"metasploit" ,
"metasploit-framework" ,
"metasploit-modules" ,
"rce"
] ,
"visibility" : "public" ,
"forks" : 0 ,
"watchers" : 0 ,
"score" : 0
} ,
{
"id" : 426099647 ,
2021-11-25 07:13:08 +01:00
"name" : "CVE-2021-41773" ,
"full_name" : "ahmad4fifz\/CVE-2021-41773" ,
2021-11-09 07:12:55 +01:00
"owner" : {
"login" : "ahmad4fifz" ,
"id" : 45918058 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/45918058?v=4" ,
"html_url" : "https:\/\/github.com\/ahmad4fifz"
} ,
2021-11-25 07:13:08 +01:00
"html_url" : "https:\/\/github.com\/ahmad4fifz\/CVE-2021-41773" ,
"description" : "CVE-2021-41773 on Docker" ,
2021-11-09 07:12:55 +01:00
"fork" : false ,
"created_at" : "2021-11-09T05:13:17Z" ,
2022-01-05 13:14:16 +01:00
"updated_at" : "2022-01-05T08:44:20Z" ,
2022-02-19 13:14:06 +01:00
"pushed_at" : "2022-02-19T11:35:52Z" ,
2021-12-19 19:14:47 +01:00
"stargazers_count" : 1 ,
"watchers_count" : 1 ,
"forks_count" : 1 ,
2021-11-09 07:12:55 +01:00
"allow_forking" : true ,
"is_template" : false ,
"topics" : [
"apache" ,
"cve" ,
"cve-2021-41773" ,
2021-11-25 07:13:08 +01:00
"docker" ,
"docker-compose" ,
2021-11-09 07:12:55 +01:00
"lfi" ,
"rce"
] ,
"visibility" : "public" ,
2021-12-19 19:14:47 +01:00
"forks" : 1 ,
"watchers" : 1 ,
2021-11-09 07:12:55 +01:00
"score" : 0
2021-11-14 07:12:52 +01:00
} ,
{
"id" : 427815832 ,
"name" : "POC-CVE-2021-41773" ,
"full_name" : "kubota\/POC-CVE-2021-41773" ,
"owner" : {
"login" : "kubota" ,
"id" : 119277 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/119277?v=4" ,
"html_url" : "https:\/\/github.com\/kubota"
} ,
"html_url" : "https:\/\/github.com\/kubota\/POC-CVE-2021-41773" ,
"description" : null ,
"fork" : false ,
"created_at" : "2021-11-14T02:02:45Z" ,
2021-11-17 01:13:21 +01:00
"updated_at" : "2021-11-16T20:42:27Z" ,
"pushed_at" : "2021-11-16T20:42:25Z" ,
2021-11-14 07:12:52 +01:00
"stargazers_count" : 1 ,
"watchers_count" : 1 ,
"forks_count" : 0 ,
"allow_forking" : true ,
"is_template" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
"forks" : 0 ,
"watchers" : 1 ,
"score" : 0
2021-11-14 19:14:07 +01:00
} ,
{
"id" : 427956449 ,
"name" : "CVE-2021-41773" ,
"full_name" : "xMohamed0\/CVE-2021-41773" ,
"owner" : {
"login" : "xMohamed0" ,
"id" : 94008154 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/94008154?v=4" ,
"html_url" : "https:\/\/github.com\/xMohamed0"
} ,
"html_url" : "https:\/\/github.com\/xMohamed0\/CVE-2021-41773" ,
"description" : null ,
"fork" : false ,
"created_at" : "2021-11-14T14:50:45Z" ,
"updated_at" : "2021-11-14T14:55:20Z" ,
"pushed_at" : "2021-11-14T14:55:18Z" ,
"stargazers_count" : 0 ,
"watchers_count" : 0 ,
"forks_count" : 0 ,
"allow_forking" : true ,
"is_template" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
"forks" : 0 ,
"watchers" : 0 ,
"score" : 0
2021-11-26 07:12:58 +01:00
} ,
2021-12-15 07:15:25 +01:00
{
"id" : 438514241 ,
"name" : "MASS_CVE-2021-41773" ,
"full_name" : "i6c\/MASS_CVE-2021-41773" ,
"owner" : {
"login" : "i6c" ,
"id" : 87837042 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/87837042?v=4" ,
"html_url" : "https:\/\/github.com\/i6c"
} ,
"html_url" : "https:\/\/github.com\/i6c\/MASS_CVE-2021-41773" ,
"description" : null ,
"fork" : false ,
"created_at" : "2021-12-15T06:04:41Z" ,
2021-12-24 19:13:30 +01:00
"updated_at" : "2021-12-24T17:27:13Z" ,
2021-12-15 07:15:25 +01:00
"pushed_at" : "2021-12-15T06:06:53Z" ,
2021-12-24 19:13:30 +01:00
"stargazers_count" : 3 ,
"watchers_count" : 3 ,
2021-12-22 01:14:26 +01:00
"forks_count" : 1 ,
2021-12-15 07:15:25 +01:00
"allow_forking" : true ,
"is_template" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
2021-12-22 01:14:26 +01:00
"forks" : 1 ,
2021-12-24 19:13:30 +01:00
"watchers" : 3 ,
2021-12-15 07:15:25 +01:00
"score" : 0
2021-12-26 19:13:31 +01:00
} ,
2022-01-12 19:14:49 +01:00
{
"id" : 447314257 ,
"name" : "CVE-2021-41773-exploiter" ,
"full_name" : "norrig\/CVE-2021-41773-exploiter" ,
"owner" : {
"login" : "norrig" ,
"id" : 5526261 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/5526261?v=4" ,
"html_url" : "https:\/\/github.com\/norrig"
} ,
"html_url" : "https:\/\/github.com\/norrig\/CVE-2021-41773-exploiter" ,
"description" : "School project - Please use other repos for actual testing" ,
"fork" : false ,
"created_at" : "2022-01-12T17:42:36Z" ,
2022-01-13 01:14:02 +01:00
"updated_at" : "2022-01-12T18:26:57Z" ,
2022-01-13 19:18:29 +01:00
"pushed_at" : "2022-01-13T16:18:33Z" ,
2022-01-12 19:14:49 +01:00
"stargazers_count" : 0 ,
"watchers_count" : 0 ,
"forks_count" : 0 ,
"allow_forking" : true ,
"is_template" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
"forks" : 0 ,
"watchers" : 0 ,
"score" : 0
2022-01-26 13:14:28 +01:00
} ,
{
"id" : 452242021 ,
"name" : "CVE-2021-41773-exercise" ,
"full_name" : "m96dg\/CVE-2021-41773-exercise" ,
"owner" : {
"login" : "m96dg" ,
"id" : 65173648 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/65173648?v=4" ,
"html_url" : "https:\/\/github.com\/m96dg"
} ,
"html_url" : "https:\/\/github.com\/m96dg\/CVE-2021-41773-exercise" ,
"description" : "A flaw was found in a change made to path normalization in Apache HTTP Server 2.4.49. An attacker could use a path traversal attack to map URLs to files outside the directories configured by Alias-like directives. If files outside of these directories are not protected by the usual default configuration \"require all denied\", these requests can succeed. If CGI scripts are also enabled for these aliased pathes, this could allow for remote code execution. This issue only affects Apache 2.4.49 and not earlier versions. Credits to: https:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2021-41773 " ,
"fork" : false ,
"created_at" : "2022-01-26T11:02:46Z" ,
"updated_at" : "2022-01-26T11:22:13Z" ,
2022-01-31 01:15:10 +01:00
"pushed_at" : "2022-01-30T19:02:43Z" ,
2022-01-26 13:14:28 +01:00
"stargazers_count" : 0 ,
"watchers_count" : 0 ,
"forks_count" : 0 ,
"allow_forking" : true ,
"is_template" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
"forks" : 0 ,
"watchers" : 0 ,
"score" : 0
2022-03-04 01:14:21 +01:00
} ,
{
"id" : 464271089 ,
"name" : "CVE-2021-41773" ,
"full_name" : "skentagon\/CVE-2021-41773" ,
"owner" : {
"login" : "skentagon" ,
"id" : 49702576 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/49702576?v=4" ,
"html_url" : "https:\/\/github.com\/skentagon"
} ,
"html_url" : "https:\/\/github.com\/skentagon\/CVE-2021-41773" ,
"description" : null ,
"fork" : false ,
"created_at" : "2022-02-27T22:39:58Z" ,
"updated_at" : "2022-03-04T00:11:58Z" ,
"pushed_at" : "2022-03-04T00:05:44Z" ,
"stargazers_count" : 0 ,
"watchers_count" : 0 ,
"forks_count" : 0 ,
"allow_forking" : true ,
"is_template" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
"forks" : 0 ,
"watchers" : 0 ,
"score" : 0
2021-10-05 23:14:32 +02:00
}
]