[ { "id": 413890827, "name": "cve-2021-41773", "full_name": "Vulnmachines\/cve-2021-41773", "owner": { "login": "Vulnmachines", "id": 79006904, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/79006904?v=4", "html_url": "https:\/\/github.com\/Vulnmachines" }, "html_url": "https:\/\/github.com\/Vulnmachines\/cve-2021-41773", "description": "CVE-2021-41773 Path Traversal vulnerability in Apache 2.4.49.", "fork": false, "created_at": "2021-10-05T16:13:38Z", "updated_at": "2022-03-23T16:50:30Z", "pushed_at": "2022-03-10T14:02:09Z", "stargazers_count": 38, "watchers_count": 38, "forks_count": 11, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", "forks": 11, "watchers": 38, "score": 0 }, { "id": 413916846, "name": "PoC-CVE-2021-41773", "full_name": "iilegacyyii\/PoC-CVE-2021-41773", "owner": { "login": "iilegacyyii", "id": 68760809, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/68760809?v=4", "html_url": "https:\/\/github.com\/iilegacyyii" }, "html_url": "https:\/\/github.com\/iilegacyyii\/PoC-CVE-2021-41773", "description": null, "fork": false, "created_at": "2021-10-05T17:30:43Z", "updated_at": "2022-03-16T11:34:06Z", "pushed_at": "2021-11-24T12:57:46Z", "stargazers_count": 40, "watchers_count": 40, "forks_count": 37, "allow_forking": true, "is_template": false, "topics": [ "apache", "cve", "lfi", "poc", "rce" ], "visibility": "public", "forks": 37, "watchers": 40, "score": 0 }, { "id": 414043746, "name": "CVE-2021-41773_CVE-2021-42013", "full_name": "Ls4ss\/CVE-2021-41773_CVE-2021-42013", "owner": { "login": "Ls4ss", "id": 25537761, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/25537761?v=4", "html_url": "https:\/\/github.com\/Ls4ss" }, "html_url": "https:\/\/github.com\/Ls4ss\/CVE-2021-41773_CVE-2021-42013", "description": "Apache HTTP Server 2.4.49, 2.4.50 - Path Traversal & RCE", "fork": false, "created_at": "2021-10-06T02:28:41Z", "updated_at": "2022-03-14T15:59:57Z", "pushed_at": "2021-12-22T23:54:18Z", "stargazers_count": 19, "watchers_count": 19, "forks_count": 8, "allow_forking": true, "is_template": false, "topics": [ "apache", "cve", "exploit", "payload", "pentest", "rce" ], "visibility": "public", "forks": 8, "watchers": 19, "score": 0 }, { "id": 414804962, "name": "CVE-2021-41773", "full_name": "shellreaper\/CVE-2021-41773", "owner": { "login": "shellreaper", "id": 76930483, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/76930483?v=4", "html_url": "https:\/\/github.com\/shellreaper" }, "html_url": "https:\/\/github.com\/shellreaper\/CVE-2021-41773", "description": "This is a simple POC for Apache\/2.4.49 Path Traversal Vulnerability", "fork": false, "created_at": "2021-10-08T01:13:33Z", "updated_at": "2021-11-12T00:05:10Z", "pushed_at": "2021-11-12T00:03:34Z", "stargazers_count": 4, "watchers_count": 4, "forks_count": 2, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", "forks": 2, "watchers": 4, "score": 0 }, { "id": 420407065, "name": "cve-2021-41773", "full_name": "walnutsecurity\/cve-2021-41773", "owner": { "login": "walnutsecurity", "id": 92915142, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/92915142?v=4", "html_url": "https:\/\/github.com\/walnutsecurity" }, "html_url": "https:\/\/github.com\/walnutsecurity\/cve-2021-41773", "description": "cve-2021-41773.py is a python script that will help in finding Path Traversal or Remote Code Execution vulnerability in Apache 2.4.49", "fork": false, "created_at": "2021-10-23T12:31:53Z", "updated_at": "2021-11-25T09:32:45Z", "pushed_at": "2021-11-25T09:32:43Z", "stargazers_count": 0, "watchers_count": 0, "forks_count": 1, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", "forks": 1, "watchers": 0, "score": 0 }, { "id": 421553366, "name": "CVE-2021-41773", "full_name": "Balgogan\/CVE-2021-41773", "owner": { "login": "Balgogan", "id": 88535377, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/88535377?v=4", "html_url": "https:\/\/github.com\/Balgogan" }, "html_url": "https:\/\/github.com\/Balgogan\/CVE-2021-41773", "description": "Ce programme permet de détecter une faille RCE sur les serveurs Apache 2.4.49 et Apache 2.4.50", "fork": false, "created_at": "2021-10-26T19:11:28Z", "updated_at": "2022-03-14T21:33:30Z", "pushed_at": "2021-11-11T00:48:37Z", "stargazers_count": 12, "watchers_count": 12, "forks_count": 4, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", "forks": 4, "watchers": 12, "score": 0 }, { "id": 422466104, "name": "CVE-2021-41773", "full_name": "wolf1892\/CVE-2021-41773", "owner": { "login": "wolf1892", "id": 24608781, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/24608781?v=4", "html_url": "https:\/\/github.com\/wolf1892" }, "html_url": "https:\/\/github.com\/wolf1892\/CVE-2021-41773", "description": "Setup vulnerable enviornment", "fork": false, "created_at": "2021-10-29T06:31:57Z", "updated_at": "2021-10-29T06:33:41Z", "pushed_at": "2021-10-29T06:33:39Z", "stargazers_count": 0, "watchers_count": 0, "forks_count": 0, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 0, "score": 0 }, { "id": 424762276, "name": "CVE-2021-41773-Playground", "full_name": "Hydragyrum\/CVE-2021-41773-Playground", "owner": { "login": "Hydragyrum", "id": 4928181, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/4928181?v=4", "html_url": "https:\/\/github.com\/Hydragyrum" }, "html_url": "https:\/\/github.com\/Hydragyrum\/CVE-2021-41773-Playground", "description": "Some docker images to play with CVE-2021-41773 and CVE-2021-42013", "fork": false, "created_at": "2021-11-04T22:52:44Z", "updated_at": "2022-01-11T09:06:38Z", "pushed_at": "2021-11-04T22:56:14Z", "stargazers_count": 5, "watchers_count": 5, "forks_count": 1, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", "forks": 1, "watchers": 5, "score": 0 }, { "id": 426066790, "name": "Apache-2.4.49-2.4.50-Traversal-Remote-Code-Execution-Exploit", "full_name": "IcmpOff\/Apache-2.4.49-2.4.50-Traversal-Remote-Code-Execution-Exploit", "owner": { "login": "IcmpOff", "id": 71145797, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/71145797?v=4", "html_url": "https:\/\/github.com\/IcmpOff" }, "html_url": "https:\/\/github.com\/IcmpOff\/Apache-2.4.49-2.4.50-Traversal-Remote-Code-Execution-Exploit", "description": "This Metasploit module exploits an unauthenticated remote code execution vulnerability which exists in Apache version 2.4.49 (CVE-2021-41773). If files outside of the document root are not protected by ‘require all denied’ and CGI has been explicitly enabled, it can be used to execute arbitrary commands. This vulnerability has been reintroduced in the Apache 2.4.50 fix (CVE-2021-42013).", "fork": false, "created_at": "2021-11-09T02:38:13Z", "updated_at": "2021-11-09T02:42:52Z", "pushed_at": "2021-11-09T02:39:22Z", "stargazers_count": 0, "watchers_count": 0, "forks_count": 0, "allow_forking": true, "is_template": false, "topics": [ "apache", "exploit", "metasploit", "metasploit-framework", "metasploit-modules", "rce" ], "visibility": "public", "forks": 0, "watchers": 0, "score": 0 }, { "id": 427815832, "name": "POC-CVE-2021-41773", "full_name": "kubota\/POC-CVE-2021-41773", "owner": { "login": "kubota", "id": 119277, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/119277?v=4", "html_url": "https:\/\/github.com\/kubota" }, "html_url": "https:\/\/github.com\/kubota\/POC-CVE-2021-41773", "description": null, "fork": false, "created_at": "2021-11-14T02:02:45Z", "updated_at": "2021-11-16T20:42:27Z", "pushed_at": "2021-11-16T20:42:25Z", "stargazers_count": 1, "watchers_count": 1, "forks_count": 0, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 1, "score": 0 }, { "id": 427956449, "name": "CVE-2021-41773", "full_name": "xMohamed0\/CVE-2021-41773", "owner": { "login": "xMohamed0", "id": 94008154, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/94008154?v=4", "html_url": "https:\/\/github.com\/xMohamed0" }, "html_url": "https:\/\/github.com\/xMohamed0\/CVE-2021-41773", "description": null, "fork": false, "created_at": "2021-11-14T14:50:45Z", "updated_at": "2021-11-14T14:55:20Z", "pushed_at": "2021-11-14T14:55:18Z", "stargazers_count": 0, "watchers_count": 0, "forks_count": 0, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 0, "score": 0 }, { "id": 438514241, "name": "MASS_CVE-2021-41773", "full_name": "i6c\/MASS_CVE-2021-41773", "owner": { "login": "i6c", "id": 87837042, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/87837042?v=4", "html_url": "https:\/\/github.com\/i6c" }, "html_url": "https:\/\/github.com\/i6c\/MASS_CVE-2021-41773", "description": null, "fork": false, "created_at": "2021-12-15T06:04:41Z", "updated_at": "2021-12-24T17:27:13Z", "pushed_at": "2021-12-15T06:06:53Z", "stargazers_count": 3, "watchers_count": 3, "forks_count": 1, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", "forks": 1, "watchers": 3, "score": 0 }, { "id": 447314257, "name": "CVE-2021-41773-exploiter", "full_name": "norrig\/CVE-2021-41773-exploiter", "owner": { "login": "norrig", "id": 5526261, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/5526261?v=4", "html_url": "https:\/\/github.com\/norrig" }, "html_url": "https:\/\/github.com\/norrig\/CVE-2021-41773-exploiter", "description": "School project - Please use other repos for actual testing", "fork": false, "created_at": "2022-01-12T17:42:36Z", "updated_at": "2022-01-12T18:26:57Z", "pushed_at": "2022-01-13T16:18:33Z", "stargazers_count": 0, "watchers_count": 0, "forks_count": 0, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 0, "score": 0 }, { "id": 452242021, "name": "CVE-2021-41773-exercise", "full_name": "m96dg\/CVE-2021-41773-exercise", "owner": { "login": "m96dg", "id": 65173648, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/65173648?v=4", "html_url": "https:\/\/github.com\/m96dg" }, "html_url": "https:\/\/github.com\/m96dg\/CVE-2021-41773-exercise", "description": "A flaw was found in a change made to path normalization in Apache HTTP Server 2.4.49. An attacker could use a path traversal attack to map URLs to files outside the directories configured by Alias-like directives. If files outside of these directories are not protected by the usual default configuration \"require all denied\", these requests can succeed. If CGI scripts are also enabled for these aliased pathes, this could allow for remote code execution. This issue only affects Apache 2.4.49 and not earlier versions. Credits to: https:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2021-41773 ", "fork": false, "created_at": "2022-01-26T11:02:46Z", "updated_at": "2022-01-26T11:22:13Z", "pushed_at": "2022-01-30T19:02:43Z", "stargazers_count": 0, "watchers_count": 0, "forks_count": 0, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 0, "score": 0 }, { "id": 464271089, "name": "CVE-2021-41773", "full_name": "skentagon\/CVE-2021-41773", "owner": { "login": "skentagon", "id": 49702576, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/49702576?v=4", "html_url": "https:\/\/github.com\/skentagon" }, "html_url": "https:\/\/github.com\/skentagon\/CVE-2021-41773", "description": null, "fork": false, "created_at": "2022-02-27T22:39:58Z", "updated_at": "2022-03-04T00:11:58Z", "pushed_at": "2022-03-04T00:05:44Z", "stargazers_count": 0, "watchers_count": 0, "forks_count": 0, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 0, "score": 0 }, { "id": 467687901, "name": "CVE-2021-41773", "full_name": "mauricelambert\/CVE-2021-41773", "owner": { "login": "mauricelambert", "id": 50479118, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/50479118?v=4", "html_url": "https:\/\/github.com\/mauricelambert" }, "html_url": "https:\/\/github.com\/mauricelambert\/CVE-2021-41773", "description": "These Metasploit, Nmap, Python and Ruby scripts detects and exploits CVE-2021-41773 with RCE and local file disclosure.", "fork": false, "created_at": "2022-03-08T21:55:53Z", "updated_at": "2022-03-23T16:56:34Z", "pushed_at": "2022-03-14T07:34:49Z", "stargazers_count": 1, "watchers_count": 1, "forks_count": 0, "allow_forking": true, "is_template": false, "topics": [ "cve", "cve-2021-41773", "detection", "exploit", "metasploit", "nmap", "python3", "rce", "ruby", "scanner", "vulnerability" ], "visibility": "public", "forks": 0, "watchers": 1, "score": 0 }, { "id": 468909402, "name": "CVE-2021-41773", "full_name": "the29a\/CVE-2021-41773", "owner": { "login": "the29a", "id": 4436697, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/4436697?v=4", "html_url": "https:\/\/github.com\/the29a" }, "html_url": "https:\/\/github.com\/the29a\/CVE-2021-41773", "description": "Small PoC of CVE-2021-41773", "fork": false, "created_at": "2022-03-11T21:50:35Z", "updated_at": "2022-03-11T21:52:35Z", "pushed_at": "2022-03-11T22:10:25Z", "stargazers_count": 0, "watchers_count": 0, "forks_count": 0, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 0, "score": 0 }, { "id": 469203660, "name": "CVE-2021-41773", "full_name": "thehackersbrain\/CVE-2021-41773", "owner": { "login": "thehackersbrain", "id": 36809025, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/36809025?v=4", "html_url": "https:\/\/github.com\/thehackersbrain" }, "html_url": "https:\/\/github.com\/thehackersbrain\/CVE-2021-41773", "description": "Apache2 2.4.49 - LFI & RCE Exploit - CVE-2021-41773", "fork": false, "created_at": "2022-03-12T21:24:55Z", "updated_at": "2022-03-24T13:32:22Z", "pushed_at": "2022-03-12T21:30:58Z", "stargazers_count": 50, "watchers_count": 50, "forks_count": 15, "allow_forking": true, "is_template": false, "topics": [ "apache2", "cve-2021-41773", "exploit", "gauravraj", "lfi", "python", "rce", "thehackersbrain" ], "visibility": "public", "forks": 15, "watchers": 50, "score": 0 }, { "id": 469576020, "name": "CVE-2021-41773", "full_name": "cryst4lliz3\/CVE-2021-41773", "owner": { "login": "cryst4lliz3", "id": 101309325, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/101309325?v=4", "html_url": "https:\/\/github.com\/cryst4lliz3" }, "html_url": "https:\/\/github.com\/cryst4lliz3\/CVE-2021-41773", "description": null, "fork": false, "created_at": "2022-03-14T04:08:56Z", "updated_at": "2022-03-14T04:09:11Z", "pushed_at": "2022-03-14T04:09:05Z", "stargazers_count": 0, "watchers_count": 0, "forks_count": 0, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 0, "score": 0 }, { "id": 469821841, "name": "CVE-2021-41773", "full_name": "Fa1c0n35\/CVE-2021-41773", "owner": { "login": "Fa1c0n35", "id": 33335488, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/33335488?v=4", "html_url": "https:\/\/github.com\/Fa1c0n35" }, "html_url": "https:\/\/github.com\/Fa1c0n35\/CVE-2021-41773", "description": null, "fork": false, "created_at": "2022-03-14T16:43:49Z", "updated_at": "2022-03-14T16:44:00Z", "pushed_at": "2022-03-14T16:43:57Z", "stargazers_count": 0, "watchers_count": 0, "forks_count": 0, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 0, "score": 0 } ]