PoC-in-GitHub/2021/CVE-2021-41773.json

881 lines
30 KiB
JSON
Raw Normal View History

2021-10-05 23:14:32 +02:00
[
{
"id": 413890827,
"name": "cve-2021-41773",
"full_name": "Vulnmachines\/cve-2021-41773",
"owner": {
"login": "Vulnmachines",
"id": 79006904,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/79006904?v=4",
"html_url": "https:\/\/github.com\/Vulnmachines"
},
"html_url": "https:\/\/github.com\/Vulnmachines\/cve-2021-41773",
"description": "CVE-2021-41773 Path Traversal vulnerability in Apache 2.4.49.",
"fork": false,
"created_at": "2021-10-05T16:13:38Z",
2022-02-16 13:14:14 +01:00
"updated_at": "2022-02-16T09:56:16Z",
2021-12-07 19:15:07 +01:00
"pushed_at": "2021-12-07T12:48:44Z",
2022-02-16 13:14:14 +01:00
"stargazers_count": 35,
"watchers_count": 35,
2022-01-13 19:18:29 +01:00
"forks_count": 11,
2021-10-05 23:14:32 +02:00
"allow_forking": true,
2021-10-06 23:13:51 +02:00
"is_template": false,
"topics": [],
2021-10-05 23:14:32 +02:00
"visibility": "public",
2022-01-13 19:18:29 +01:00
"forks": 11,
2022-02-16 13:14:14 +01:00
"watchers": 35,
2021-10-05 23:14:32 +02:00
"score": 0
},
{
"id": 413916846,
"name": "PoC-CVE-2021-41773",
"full_name": "iilegacyyii\/PoC-CVE-2021-41773",
"owner": {
"login": "iilegacyyii",
"id": 68760809,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/68760809?v=4",
"html_url": "https:\/\/github.com\/iilegacyyii"
},
"html_url": "https:\/\/github.com\/iilegacyyii\/PoC-CVE-2021-41773",
"description": null,
"fork": false,
"created_at": "2021-10-05T17:30:43Z",
2022-02-20 01:14:10 +01:00
"updated_at": "2022-02-19T20:08:56Z",
2021-11-24 19:13:10 +01:00
"pushed_at": "2021-11-24T12:57:46Z",
2022-02-20 01:14:10 +01:00
"stargazers_count": 39,
"watchers_count": 39,
2022-02-01 13:14:29 +01:00
"forks_count": 37,
2021-10-05 23:14:32 +02:00
"allow_forking": true,
2021-10-06 23:13:51 +02:00
"is_template": false,
2021-11-24 19:13:10 +01:00
"topics": [
"apache",
"cve",
"lfi",
"poc",
"rce"
],
2021-10-05 23:14:32 +02:00
"visibility": "public",
2022-02-01 13:14:29 +01:00
"forks": 37,
2022-02-20 01:14:10 +01:00
"watchers": 39,
2021-10-05 23:14:32 +02:00
"score": 0
},
2021-10-06 05:15:02 +02:00
{
"id": 414043746,
2021-10-09 23:12:27 +02:00
"name": "CVE-2021-41773_CVE-2021-42013",
"full_name": "Ls4ss\/CVE-2021-41773_CVE-2021-42013",
2021-10-06 05:15:02 +02:00
"owner": {
2021-10-06 23:13:51 +02:00
"login": "Ls4ss",
2021-10-06 05:15:02 +02:00
"id": 25537761,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/25537761?v=4",
2021-10-06 23:13:51 +02:00
"html_url": "https:\/\/github.com\/Ls4ss"
2021-10-06 05:15:02 +02:00
},
2021-10-09 23:12:27 +02:00
"html_url": "https:\/\/github.com\/Ls4ss\/CVE-2021-41773_CVE-2021-42013",
"description": "Apache HTTP Server 2.4.49, 2.4.50 - Path Traversal & RCE",
2021-10-06 05:15:02 +02:00
"fork": false,
"created_at": "2021-10-06T02:28:41Z",
2022-02-22 19:17:26 +01:00
"updated_at": "2022-02-22T16:06:38Z",
2021-12-23 01:13:39 +01:00
"pushed_at": "2021-12-22T23:54:18Z",
2022-02-22 19:17:26 +01:00
"stargazers_count": 17,
"watchers_count": 17,
2021-12-23 01:13:39 +01:00
"forks_count": 8,
2021-10-06 05:15:02 +02:00
"allow_forking": true,
2021-10-06 23:13:51 +02:00
"is_template": false,
"topics": [
"apache",
"cve",
"exploit",
"payload",
"pentest",
"rce"
],
2021-10-06 05:15:02 +02:00
"visibility": "public",
2021-12-23 01:13:39 +01:00
"forks": 8,
2022-02-22 19:17:26 +01:00
"watchers": 17,
2021-10-06 05:15:02 +02:00
"score": 0
},
2021-10-06 23:13:51 +02:00
{
"id": 414256797,
"name": "apache_normalize_path",
"full_name": "Zeop-CyberSec\/apache_normalize_path",
"owner": {
"login": "Zeop-CyberSec",
"id": 68154603,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/68154603?v=4",
"html_url": "https:\/\/github.com\/Zeop-CyberSec"
},
"html_url": "https:\/\/github.com\/Zeop-CyberSec\/apache_normalize_path",
2021-10-08 17:13:03 +02:00
"description": "Metasploit-Framework modules (scanner and exploit) for the CVE-2021-41773 and CVE-2021-42013 (Path Traversal in Apache 2.4.49\/2.4.50)",
2021-10-06 23:13:51 +02:00
"fork": false,
"created_at": "2021-10-06T14:58:27Z",
2021-11-08 01:12:56 +01:00
"updated_at": "2021-11-07T19:19:39Z",
2021-10-21 23:13:05 +02:00
"pushed_at": "2021-10-21T18:51:00Z",
2021-11-08 01:12:56 +01:00
"stargazers_count": 12,
"watchers_count": 12,
"forks_count": 4,
2021-10-06 23:13:51 +02:00
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
2021-11-08 01:12:56 +01:00
"forks": 4,
"watchers": 12,
2021-10-06 23:13:51 +02:00
"score": 0
},
{
2021-10-07 23:13:16 +02:00
"id": 414376599,
"name": "CVE-2021-41773",
"full_name": "AssassinUKG\/CVE-2021-41773",
2021-10-06 23:13:51 +02:00
"owner": {
2021-10-07 23:13:16 +02:00
"login": "AssassinUKG",
"id": 5285547,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/5285547?v=4",
"html_url": "https:\/\/github.com\/AssassinUKG"
2021-10-06 23:13:51 +02:00
},
2021-10-07 23:13:16 +02:00
"html_url": "https:\/\/github.com\/AssassinUKG\/CVE-2021-41773",
"description": "Apache 2.4.49",
"fork": false,
"created_at": "2021-10-06T21:37:18Z",
2021-10-21 05:12:58 +02:00
"updated_at": "2021-10-20T23:04:09Z",
"pushed_at": "2021-10-20T23:04:06Z",
2021-10-10 23:13:34 +02:00
"stargazers_count": 3,
"watchers_count": 3,
"forks_count": 1,
2021-10-07 23:13:16 +02:00
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
2021-10-10 23:13:34 +02:00
"forks": 1,
"watchers": 3,
2021-10-07 23:13:16 +02:00
"score": 0
},
2021-10-08 05:12:49 +02:00
{
"id": 414804962,
"name": "CVE-2021-41773",
"full_name": "shellreaper\/CVE-2021-41773",
"owner": {
"login": "shellreaper",
"id": 76930483,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/76930483?v=4",
"html_url": "https:\/\/github.com\/shellreaper"
},
"html_url": "https:\/\/github.com\/shellreaper\/CVE-2021-41773",
2021-11-12 01:13:05 +01:00
"description": "This is a simple POC for Apache\/2.4.49 Path Traversal Vulnerability",
2021-10-08 05:12:49 +02:00
"fork": false,
"created_at": "2021-10-08T01:13:33Z",
2021-11-12 01:13:05 +01:00
"updated_at": "2021-11-12T00:05:10Z",
"pushed_at": "2021-11-12T00:03:34Z",
2021-10-10 23:13:34 +02:00
"stargazers_count": 4,
"watchers_count": 4,
"forks_count": 2,
2021-10-08 11:13:11 +02:00
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
2021-10-10 23:13:34 +02:00
"forks": 2,
"watchers": 4,
2021-10-08 11:13:11 +02:00
"score": 0
},
2021-10-25 11:15:13 +02:00
{
"id": 414878778,
"name": "CVE-2021-41773",
"full_name": "corelight\/CVE-2021-41773",
"owner": {
"login": "corelight",
"id": 21672558,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/21672558?v=4",
"html_url": "https:\/\/github.com\/corelight"
},
"html_url": "https:\/\/github.com\/corelight\/CVE-2021-41773",
"description": "A Zeek package which raises notices for Path Traversal\/RCE in Apache HTTP Server 2.4.49 (CVE-2021-41773) and 2.4.50 (CVE-2021-42013)",
"fork": false,
"created_at": "2021-10-08T06:54:27Z",
2021-10-28 11:15:29 +02:00
"updated_at": "2021-10-28T05:48:41Z",
"pushed_at": "2021-10-28T05:55:41Z",
2021-10-25 17:14:27 +02:00
"stargazers_count": 1,
"watchers_count": 1,
2021-12-15 19:14:01 +01:00
"forks_count": 1,
2021-10-25 11:15:13 +02:00
"allow_forking": true,
"is_template": false,
2021-10-08 11:13:11 +02:00
"topics": [],
"visibility": "public",
2021-10-10 23:13:34 +02:00
"forks": 1,
"watchers": 1,
2021-10-08 05:12:49 +02:00
"score": 0
2021-10-08 23:12:47 +02:00
},
2021-10-15 17:14:24 +02:00
{
"id": 417461813,
"name": "apache-httpd-path-traversal-checker",
"full_name": "theLSA\/apache-httpd-path-traversal-checker",
"owner": {
"login": "theLSA",
"id": 28248956,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/28248956?v=4",
"html_url": "https:\/\/github.com\/theLSA"
},
"html_url": "https:\/\/github.com\/theLSA\/apache-httpd-path-traversal-checker",
"description": "apache httpd path traversal checker(CVE-2021-41773 \/ CVE-2021-42013)",
"fork": false,
"created_at": "2021-10-15T10:38:44Z",
2022-01-31 13:14:22 +01:00
"updated_at": "2022-01-31T07:15:01Z",
2021-10-16 17:12:34 +02:00
"pushed_at": "2021-10-16T10:28:23Z",
2022-01-31 13:14:22 +01:00
"stargazers_count": 6,
"watchers_count": 6,
2021-12-23 07:15:07 +01:00
"forks_count": 4,
2021-10-15 17:14:24 +02:00
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
2021-12-23 07:15:07 +01:00
"forks": 4,
2022-01-31 13:14:22 +01:00
"watchers": 6,
2021-10-13 23:12:52 +02:00
"score": 0
2021-10-16 05:12:36 +02:00
},
{
"id": 417643516,
"name": "CVE-2021-41773",
"full_name": "LudovicPatho\/CVE-2021-41773",
"owner": {
"login": "LudovicPatho",
"id": 26960886,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/26960886?v=4",
"html_url": "https:\/\/github.com\/LudovicPatho"
},
"html_url": "https:\/\/github.com\/LudovicPatho\/CVE-2021-41773",
"description": "The first vulnerability with the CVE identifier CVE-2021-41773 is a path traversal flaw that exists in Apache HTTP Server 2.4.49.",
"fork": false,
"created_at": "2021-10-15T21:38:48Z",
2021-10-21 11:13:06 +02:00
"updated_at": "2021-10-21T07:26:16Z",
"pushed_at": "2021-10-21T07:26:13Z",
2021-10-16 05:12:36 +02:00
"stargazers_count": 0,
"watchers_count": 0,
2021-10-16 17:12:34 +02:00
"forks_count": 1,
2021-10-16 05:12:36 +02:00
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
2021-10-16 17:12:34 +02:00
"forks": 1,
2021-10-16 05:12:36 +02:00
"watchers": 0,
"score": 0
},
2021-10-16 23:12:32 +02:00
{
"id": 417869261,
"name": "CVE-2021-41773_Honeypot",
"full_name": "lopqto\/CVE-2021-41773_Honeypot",
"owner": {
"login": "lopqto",
"id": 30213943,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/30213943?v=4",
"html_url": "https:\/\/github.com\/lopqto"
},
"html_url": "https:\/\/github.com\/lopqto\/CVE-2021-41773_Honeypot",
"description": "Simple honeypot for CVE-2021-41773 vulnerability",
"fork": false,
"created_at": "2021-10-16T15:30:34Z",
2021-10-17 11:12:40 +02:00
"updated_at": "2021-10-17T08:13:10Z",
"pushed_at": "2021-10-17T08:13:08Z",
2021-10-16 23:12:32 +02:00
"stargazers_count": 0,
"watchers_count": 0,
2021-10-17 05:13:26 +02:00
"forks_count": 1,
2021-10-16 23:12:32 +02:00
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
2021-10-17 05:13:26 +02:00
"forks": 1,
2021-10-16 23:12:32 +02:00
"watchers": 0,
"score": 0
2021-10-18 17:13:29 +02:00
},
{
"id": 418481558,
"name": "CVE-2021-41773_42013",
"full_name": "vulf\/CVE-2021-41773_42013",
"owner": {
"login": "vulf",
"id": 37404408,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/37404408?v=4",
"html_url": "https:\/\/github.com\/vulf"
},
"html_url": "https:\/\/github.com\/vulf\/CVE-2021-41773_42013",
"description": "Lab setup for CVE-2021-41773 (Apache httpd 2.4.49) and CVE-2021-42013 (Apache httpd 2.4.50).",
"fork": false,
"created_at": "2021-10-18T12:01:58Z",
2021-12-10 07:14:52 +01:00
"updated_at": "2021-12-10T06:09:44Z",
2021-10-18 17:13:29 +02:00
"pushed_at": "2021-10-18T12:47:56Z",
2021-12-10 07:14:52 +01:00
"stargazers_count": 1,
"watchers_count": 1,
2021-10-20 11:13:01 +02:00
"forks_count": 2,
2021-10-18 17:13:29 +02:00
"allow_forking": true,
"is_template": false,
"topics": [
"apache",
"cve",
"cve-2021-41773",
"cve-2021-42013",
"httpd",
"lfi",
"penetration-testing",
"rce",
"security",
"vulnerable",
"web"
],
"visibility": "public",
2021-10-20 11:13:01 +02:00
"forks": 2,
2021-12-10 07:14:52 +01:00
"watchers": 1,
2021-10-18 17:13:29 +02:00
"score": 0
2021-10-20 05:12:40 +02:00
},
{
"id": 419143683,
"name": "CVE-2021-41773",
"full_name": "cloudbyteelias\/CVE-2021-41773",
"owner": {
"login": "cloudbyteelias",
"id": 44121417,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/44121417?v=4",
"html_url": "https:\/\/github.com\/cloudbyteelias"
},
"html_url": "https:\/\/github.com\/cloudbyteelias\/CVE-2021-41773",
"description": "CVE-2021-41773 Docker lab",
"fork": false,
"created_at": "2021-10-20T01:20:21Z",
2021-11-05 01:13:01 +01:00
"updated_at": "2021-11-04T23:37:34Z",
2021-10-20 05:12:40 +02:00
"pushed_at": "2021-10-20T01:21:34Z",
2021-11-05 01:13:01 +01:00
"stargazers_count": 2,
"watchers_count": 2,
2021-10-20 05:12:40 +02:00
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"topics": [
"cve-2021-41773"
],
"visibility": "public",
"forks": 1,
2021-11-05 01:13:01 +01:00
"watchers": 2,
2021-10-20 05:12:40 +02:00
"score": 0
2021-10-20 17:14:45 +02:00
},
{
"id": 419301010,
"name": "CVE-2021-41773",
"full_name": "qwutony\/CVE-2021-41773",
"owner": {
"login": "qwutony",
"id": 45024645,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/45024645?v=4",
"html_url": "https:\/\/github.com\/qwutony"
},
"html_url": "https:\/\/github.com\/qwutony\/CVE-2021-41773",
"description": null,
"fork": false,
"created_at": "2021-10-20T11:27:12Z",
"updated_at": "2021-10-20T12:26:59Z",
"pushed_at": "2021-10-20T12:26:56Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0
},
{
"id": 419369252,
"name": "CVE-2021-41773",
2021-10-21 17:17:42 +02:00
"full_name": "LayarKacaSiber\/CVE-2021-41773",
2021-10-20 17:14:45 +02:00
"owner": {
2021-10-21 17:17:42 +02:00
"login": "LayarKacaSiber",
2021-10-20 17:14:45 +02:00
"id": 92864439,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/92864439?v=4",
2021-10-21 17:17:42 +02:00
"html_url": "https:\/\/github.com\/LayarKacaSiber"
2021-10-20 17:14:45 +02:00
},
2021-10-21 17:17:42 +02:00
"html_url": "https:\/\/github.com\/LayarKacaSiber\/CVE-2021-41773",
2021-10-20 17:14:45 +02:00
"description": null,
"fork": false,
"created_at": "2021-10-20T14:41:15Z",
2021-10-23 17:14:20 +02:00
"updated_at": "2021-10-23T13:15:51Z",
"pushed_at": "2021-10-23T13:15:48Z",
2021-10-20 17:14:45 +02:00
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0
2021-10-22 17:13:08 +02:00
},
{
"id": 420144635,
"name": "CVE-2021-41773",
"full_name": "BabyTeam1024\/CVE-2021-41773",
"owner": {
"login": "BabyTeam1024",
"id": 74447452,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/74447452?v=4",
"html_url": "https:\/\/github.com\/BabyTeam1024"
},
"html_url": "https:\/\/github.com\/BabyTeam1024\/CVE-2021-41773",
"description": null,
"fork": false,
"created_at": "2021-10-22T15:12:12Z",
2021-10-24 11:12:45 +02:00
"updated_at": "2021-10-24T07:10:34Z",
2021-10-22 23:12:49 +02:00
"pushed_at": "2021-10-22T15:23:56Z",
2021-10-24 11:12:45 +02:00
"stargazers_count": 1,
"watchers_count": 1,
"forks_count": 1,
2021-10-22 17:13:08 +02:00
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
2021-10-24 11:12:45 +02:00
"forks": 1,
"watchers": 1,
2021-10-22 17:13:08 +02:00
"score": 0
2021-10-24 05:14:30 +02:00
},
2021-10-24 17:12:31 +02:00
{
"id": 420407065,
"name": "cve-2021-41773",
"full_name": "walnutsecurity\/cve-2021-41773",
"owner": {
"login": "walnutsecurity",
"id": 92915142,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/92915142?v=4",
"html_url": "https:\/\/github.com\/walnutsecurity"
},
"html_url": "https:\/\/github.com\/walnutsecurity\/cve-2021-41773",
2021-10-27 17:14:12 +02:00
"description": "cve-2021-41773.py is a python script that will help in finding Path Traversal or Remote Code Execution vulnerability in Apache 2.4.49",
2021-10-24 17:12:31 +02:00
"fork": false,
"created_at": "2021-10-23T12:31:53Z",
2021-11-25 13:13:16 +01:00
"updated_at": "2021-11-25T09:32:45Z",
"pushed_at": "2021-11-25T09:32:43Z",
2021-10-24 17:12:31 +02:00
"stargazers_count": 0,
"watchers_count": 0,
2021-10-26 05:14:05 +02:00
"forks_count": 1,
2021-10-24 17:12:31 +02:00
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
2021-10-26 05:14:05 +02:00
"forks": 1,
2021-10-24 17:12:31 +02:00
"watchers": 0,
"score": 0
},
2021-10-24 05:14:30 +02:00
{
"id": 420528447,
"name": "CVE-2021-41773",
"full_name": "TheLastVvV\/CVE-2021-41773",
"owner": {
"login": "TheLastVvV",
"id": 71128830,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/71128830?v=4",
"html_url": "https:\/\/github.com\/TheLastVvV"
},
"html_url": "https:\/\/github.com\/TheLastVvV\/CVE-2021-41773",
"description": "Poc CVE-2021-41773 - Apache 2.4.49 with CGI enabled",
"fork": false,
"created_at": "2021-10-23T21:37:25Z",
"updated_at": "2021-10-23T23:15:50Z",
"pushed_at": "2021-10-23T21:50:36Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
2021-11-30 13:14:49 +01:00
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0
},
{
"id": 421138366,
"name": "CVE-2021-41773",
"full_name": "MazX0p\/CVE-2021-41773",
"owner": {
"login": "MazX0p",
"id": 54814433,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/54814433?v=4",
"html_url": "https:\/\/github.com\/MazX0p"
},
"html_url": "https:\/\/github.com\/MazX0p\/CVE-2021-41773",
"description": null,
"fork": false,
"created_at": "2021-10-25T18:21:43Z",
"updated_at": "2021-10-25T18:39:13Z",
"pushed_at": "2021-10-25T18:39:11Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
2021-10-24 05:14:30 +02:00
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0
2021-10-25 23:13:03 +02:00
},
2021-10-26 05:14:05 +02:00
{
"id": 421191229,
"name": "Scanner-CVE-2021-41773",
"full_name": "vida00\/Scanner-CVE-2021-41773",
"owner": {
"login": "vida00",
"id": 77762068,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/77762068?v=4",
"html_url": "https:\/\/github.com\/vida00"
},
"html_url": "https:\/\/github.com\/vida00\/Scanner-CVE-2021-41773",
"description": "A automatic scanner to apache 2.4.49",
"fork": false,
"created_at": "2021-10-25T21:34:08Z",
"updated_at": "2021-10-25T22:17:23Z",
"pushed_at": "2021-10-25T22:17:21Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0
2021-10-26 23:16:55 +02:00
},
{
"id": 421530564,
"name": "CVE-2021-41773",
"full_name": "mr-exo\/CVE-2021-41773",
"owner": {
"login": "mr-exo",
"id": 76655540,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/76655540?v=4",
"html_url": "https:\/\/github.com\/mr-exo"
},
"html_url": "https:\/\/github.com\/mr-exo\/CVE-2021-41773",
"description": "Remote Code Execution exploit for Apache servers. Affected versions: Apache 2.4.49, Apache 2.4.50",
"fork": false,
"created_at": "2021-10-26T17:56:25Z",
"updated_at": "2021-10-26T18:04:45Z",
"pushed_at": "2021-10-26T18:04:43Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0
},
{
"id": 421553366,
"name": "CVE-2021-41773",
"full_name": "Balgogan\/CVE-2021-41773",
"owner": {
"login": "Balgogan",
"id": 88535377,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/88535377?v=4",
"html_url": "https:\/\/github.com\/Balgogan"
},
"html_url": "https:\/\/github.com\/Balgogan\/CVE-2021-41773",
"description": "Ce programme permet de détecter une faille RCE sur les serveurs Apache 2.4.49 et Apache 2.4.50",
"fork": false,
"created_at": "2021-10-26T19:11:28Z",
2022-02-22 19:17:26 +01:00
"updated_at": "2022-02-22T16:05:15Z",
2021-11-11 07:14:53 +01:00
"pushed_at": "2021-11-11T00:48:37Z",
2022-02-22 19:17:26 +01:00
"stargazers_count": 11,
"watchers_count": 11,
2021-11-20 01:13:28 +01:00
"forks_count": 4,
2021-10-26 23:16:55 +02:00
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
2021-11-20 01:13:28 +01:00
"forks": 4,
2022-02-22 19:17:26 +01:00
"watchers": 11,
2021-10-26 23:16:55 +02:00
"score": 0
2021-10-29 11:15:04 +02:00
},
{
"id": 422466104,
"name": "CVE-2021-41773",
"full_name": "wolf1892\/CVE-2021-41773",
"owner": {
"login": "wolf1892",
"id": 24608781,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/24608781?v=4",
"html_url": "https:\/\/github.com\/wolf1892"
},
"html_url": "https:\/\/github.com\/wolf1892\/CVE-2021-41773",
"description": "Setup vulnerable enviornment",
"fork": false,
"created_at": "2021-10-29T06:31:57Z",
"updated_at": "2021-10-29T06:33:41Z",
"pushed_at": "2021-10-29T06:33:39Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0
2021-11-05 01:13:01 +01:00
},
{
"id": 424762276,
"name": "CVE-2021-41773-Playground",
"full_name": "Hydragyrum\/CVE-2021-41773-Playground",
"owner": {
"login": "Hydragyrum",
"id": 4928181,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/4928181?v=4",
"html_url": "https:\/\/github.com\/Hydragyrum"
},
"html_url": "https:\/\/github.com\/Hydragyrum\/CVE-2021-41773-Playground",
"description": "Some docker images to play with CVE-2021-41773 and CVE-2021-42013",
"fork": false,
"created_at": "2021-11-04T22:52:44Z",
2022-01-11 13:16:14 +01:00
"updated_at": "2022-01-11T09:06:38Z",
2021-11-05 01:13:01 +01:00
"pushed_at": "2021-11-04T22:56:14Z",
2022-01-11 13:16:14 +01:00
"stargazers_count": 5,
"watchers_count": 5,
"forks_count": 1,
2021-11-05 01:13:01 +01:00
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
2022-01-11 13:16:14 +01:00
"forks": 1,
"watchers": 5,
2021-11-05 01:13:01 +01:00
"score": 0
2021-11-09 07:12:55 +01:00
},
{
"id": 426066790,
"name": "Apache-2.4.49-2.4.50-Traversal-Remote-Code-Execution-Exploit",
"full_name": "IcmpOff\/Apache-2.4.49-2.4.50-Traversal-Remote-Code-Execution-Exploit",
"owner": {
"login": "IcmpOff",
"id": 71145797,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/71145797?v=4",
"html_url": "https:\/\/github.com\/IcmpOff"
},
"html_url": "https:\/\/github.com\/IcmpOff\/Apache-2.4.49-2.4.50-Traversal-Remote-Code-Execution-Exploit",
"description": "This Metasploit module exploits an unauthenticated remote code execution vulnerability which exists in Apache version 2.4.49 (CVE-2021-41773). If files outside of the document root are not protected by require all denied and CGI has been explicitly enabled, it can be used to execute arbitrary commands. This vulnerability has been reintroduced in the Apache 2.4.50 fix (CVE-2021-42013).",
"fork": false,
"created_at": "2021-11-09T02:38:13Z",
"updated_at": "2021-11-09T02:42:52Z",
"pushed_at": "2021-11-09T02:39:22Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"topics": [
"apache",
"exploit",
"metasploit",
"metasploit-framework",
"metasploit-modules",
"rce"
],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0
},
{
"id": 426099647,
2021-11-25 07:13:08 +01:00
"name": "CVE-2021-41773",
"full_name": "ahmad4fifz\/CVE-2021-41773",
2021-11-09 07:12:55 +01:00
"owner": {
"login": "ahmad4fifz",
"id": 45918058,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/45918058?v=4",
"html_url": "https:\/\/github.com\/ahmad4fifz"
},
2021-11-25 07:13:08 +01:00
"html_url": "https:\/\/github.com\/ahmad4fifz\/CVE-2021-41773",
"description": "CVE-2021-41773 on Docker",
2021-11-09 07:12:55 +01:00
"fork": false,
"created_at": "2021-11-09T05:13:17Z",
2022-01-05 13:14:16 +01:00
"updated_at": "2022-01-05T08:44:20Z",
2022-02-19 13:14:06 +01:00
"pushed_at": "2022-02-19T11:35:52Z",
2021-12-19 19:14:47 +01:00
"stargazers_count": 1,
"watchers_count": 1,
"forks_count": 1,
2021-11-09 07:12:55 +01:00
"allow_forking": true,
"is_template": false,
"topics": [
"apache",
"cve",
"cve-2021-41773",
2021-11-25 07:13:08 +01:00
"docker",
"docker-compose",
2021-11-09 07:12:55 +01:00
"lfi",
"rce"
],
"visibility": "public",
2021-12-19 19:14:47 +01:00
"forks": 1,
"watchers": 1,
2021-11-09 07:12:55 +01:00
"score": 0
2021-11-14 07:12:52 +01:00
},
{
"id": 427815832,
"name": "POC-CVE-2021-41773",
"full_name": "kubota\/POC-CVE-2021-41773",
"owner": {
"login": "kubota",
"id": 119277,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/119277?v=4",
"html_url": "https:\/\/github.com\/kubota"
},
"html_url": "https:\/\/github.com\/kubota\/POC-CVE-2021-41773",
"description": null,
"fork": false,
"created_at": "2021-11-14T02:02:45Z",
2021-11-17 01:13:21 +01:00
"updated_at": "2021-11-16T20:42:27Z",
"pushed_at": "2021-11-16T20:42:25Z",
2021-11-14 07:12:52 +01:00
"stargazers_count": 1,
"watchers_count": 1,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 1,
"score": 0
2021-11-14 19:14:07 +01:00
},
{
"id": 427956449,
"name": "CVE-2021-41773",
"full_name": "xMohamed0\/CVE-2021-41773",
"owner": {
"login": "xMohamed0",
"id": 94008154,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/94008154?v=4",
"html_url": "https:\/\/github.com\/xMohamed0"
},
"html_url": "https:\/\/github.com\/xMohamed0\/CVE-2021-41773",
"description": null,
"fork": false,
"created_at": "2021-11-14T14:50:45Z",
"updated_at": "2021-11-14T14:55:20Z",
"pushed_at": "2021-11-14T14:55:18Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0
2021-11-26 07:12:58 +01:00
},
2021-12-15 07:15:25 +01:00
{
"id": 438514241,
"name": "MASS_CVE-2021-41773",
"full_name": "i6c\/MASS_CVE-2021-41773",
"owner": {
"login": "i6c",
"id": 87837042,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/87837042?v=4",
"html_url": "https:\/\/github.com\/i6c"
},
"html_url": "https:\/\/github.com\/i6c\/MASS_CVE-2021-41773",
"description": null,
"fork": false,
"created_at": "2021-12-15T06:04:41Z",
2021-12-24 19:13:30 +01:00
"updated_at": "2021-12-24T17:27:13Z",
2021-12-15 07:15:25 +01:00
"pushed_at": "2021-12-15T06:06:53Z",
2021-12-24 19:13:30 +01:00
"stargazers_count": 3,
"watchers_count": 3,
2021-12-22 01:14:26 +01:00
"forks_count": 1,
2021-12-15 07:15:25 +01:00
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
2021-12-22 01:14:26 +01:00
"forks": 1,
2021-12-24 19:13:30 +01:00
"watchers": 3,
2021-12-15 07:15:25 +01:00
"score": 0
2021-12-26 19:13:31 +01:00
},
2022-01-12 19:14:49 +01:00
{
"id": 447314257,
"name": "CVE-2021-41773-exploiter",
"full_name": "norrig\/CVE-2021-41773-exploiter",
"owner": {
"login": "norrig",
"id": 5526261,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/5526261?v=4",
"html_url": "https:\/\/github.com\/norrig"
},
"html_url": "https:\/\/github.com\/norrig\/CVE-2021-41773-exploiter",
"description": "School project - Please use other repos for actual testing",
"fork": false,
"created_at": "2022-01-12T17:42:36Z",
2022-01-13 01:14:02 +01:00
"updated_at": "2022-01-12T18:26:57Z",
2022-01-13 19:18:29 +01:00
"pushed_at": "2022-01-13T16:18:33Z",
2022-01-12 19:14:49 +01:00
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0
2022-01-26 13:14:28 +01:00
},
{
"id": 452242021,
"name": "CVE-2021-41773-exercise",
"full_name": "m96dg\/CVE-2021-41773-exercise",
"owner": {
"login": "m96dg",
"id": 65173648,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/65173648?v=4",
"html_url": "https:\/\/github.com\/m96dg"
},
"html_url": "https:\/\/github.com\/m96dg\/CVE-2021-41773-exercise",
"description": "A flaw was found in a change made to path normalization in Apache HTTP Server 2.4.49. An attacker could use a path traversal attack to map URLs to files outside the directories configured by Alias-like directives. If files outside of these directories are not protected by the usual default configuration \"require all denied\", these requests can succeed. If CGI scripts are also enabled for these aliased pathes, this could allow for remote code execution. This issue only affects Apache 2.4.49 and not earlier versions. Credits to: https:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2021-41773 ",
"fork": false,
"created_at": "2022-01-26T11:02:46Z",
"updated_at": "2022-01-26T11:22:13Z",
2022-01-31 01:15:10 +01:00
"pushed_at": "2022-01-30T19:02:43Z",
2022-01-26 13:14:28 +01:00
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0
2022-03-04 01:14:21 +01:00
},
{
"id": 464271089,
"name": "CVE-2021-41773",
"full_name": "skentagon\/CVE-2021-41773",
"owner": {
"login": "skentagon",
"id": 49702576,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/49702576?v=4",
"html_url": "https:\/\/github.com\/skentagon"
},
"html_url": "https:\/\/github.com\/skentagon\/CVE-2021-41773",
"description": null,
"fork": false,
"created_at": "2022-02-27T22:39:58Z",
"updated_at": "2022-03-04T00:11:58Z",
"pushed_at": "2022-03-04T00:05:44Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0
2021-10-05 23:14:32 +02:00
}
]