mirror of
https://github.com/nomi-sec/PoC-in-GitHub.git
synced 2025-01-16 04:42:22 +01:00
1042 lines
No EOL
36 KiB
JSON
1042 lines
No EOL
36 KiB
JSON
[
|
|
{
|
|
"id": 413890827,
|
|
"name": "cve-2021-41773",
|
|
"full_name": "Vulnmachines\/cve-2021-41773",
|
|
"owner": {
|
|
"login": "Vulnmachines",
|
|
"id": 79006904,
|
|
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/79006904?v=4",
|
|
"html_url": "https:\/\/github.com\/Vulnmachines"
|
|
},
|
|
"html_url": "https:\/\/github.com\/Vulnmachines\/cve-2021-41773",
|
|
"description": "CVE-2021-41773 Path Traversal vulnerability in Apache 2.4.49.",
|
|
"fork": false,
|
|
"created_at": "2021-10-05T16:13:38Z",
|
|
"updated_at": "2022-08-17T04:57:04Z",
|
|
"pushed_at": "2022-08-30T11:58:32Z",
|
|
"stargazers_count": 41,
|
|
"watchers_count": 41,
|
|
"forks_count": 13,
|
|
"allow_forking": true,
|
|
"is_template": false,
|
|
"web_commit_signoff_required": false,
|
|
"topics": [],
|
|
"visibility": "public",
|
|
"forks": 13,
|
|
"watchers": 41,
|
|
"score": 0
|
|
},
|
|
{
|
|
"id": 414043746,
|
|
"name": "CVE-2021-41773_CVE-2021-42013",
|
|
"full_name": "Ls4ss\/CVE-2021-41773_CVE-2021-42013",
|
|
"owner": {
|
|
"login": "Ls4ss",
|
|
"id": 25537761,
|
|
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/25537761?v=4",
|
|
"html_url": "https:\/\/github.com\/Ls4ss"
|
|
},
|
|
"html_url": "https:\/\/github.com\/Ls4ss\/CVE-2021-41773_CVE-2021-42013",
|
|
"description": "Apache HTTP Server 2.4.49, 2.4.50 - Path Traversal & RCE",
|
|
"fork": false,
|
|
"created_at": "2021-10-06T02:28:41Z",
|
|
"updated_at": "2022-09-12T15:02:52Z",
|
|
"pushed_at": "2022-09-09T16:09:11Z",
|
|
"stargazers_count": 22,
|
|
"watchers_count": 22,
|
|
"forks_count": 8,
|
|
"allow_forking": true,
|
|
"is_template": false,
|
|
"web_commit_signoff_required": false,
|
|
"topics": [
|
|
"apache",
|
|
"cve",
|
|
"exploit",
|
|
"payload",
|
|
"pentest",
|
|
"rce"
|
|
],
|
|
"visibility": "public",
|
|
"forks": 8,
|
|
"watchers": 22,
|
|
"score": 0
|
|
},
|
|
{
|
|
"id": 414082287,
|
|
"name": "CVE-2021-41773-POC",
|
|
"full_name": "creadpag\/CVE-2021-41773-POC",
|
|
"owner": {
|
|
"login": "creadpag",
|
|
"id": 15526083,
|
|
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/15526083?v=4",
|
|
"html_url": "https:\/\/github.com\/creadpag"
|
|
},
|
|
"html_url": "https:\/\/github.com\/creadpag\/CVE-2021-41773-POC",
|
|
"description": "CVE-2021-41773",
|
|
"fork": false,
|
|
"created_at": "2021-10-06T05:34:48Z",
|
|
"updated_at": "2021-11-15T12:00:37Z",
|
|
"pushed_at": "2022-08-29T23:05:10Z",
|
|
"stargazers_count": 11,
|
|
"watchers_count": 11,
|
|
"forks_count": 5,
|
|
"allow_forking": true,
|
|
"is_template": false,
|
|
"web_commit_signoff_required": false,
|
|
"topics": [],
|
|
"visibility": "public",
|
|
"forks": 5,
|
|
"watchers": 11,
|
|
"score": 0
|
|
},
|
|
{
|
|
"id": 414248192,
|
|
"name": "CVE-2021-41773",
|
|
"full_name": "ranggaggngntt\/CVE-2021-41773",
|
|
"owner": {
|
|
"login": "ranggaggngntt",
|
|
"id": 57105391,
|
|
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/57105391?v=4",
|
|
"html_url": "https:\/\/github.com\/ranggaggngntt"
|
|
},
|
|
"html_url": "https:\/\/github.com\/ranggaggngntt\/CVE-2021-41773",
|
|
"description": null,
|
|
"fork": false,
|
|
"created_at": "2021-10-06T14:36:05Z",
|
|
"updated_at": "2021-10-10T18:53:04Z",
|
|
"pushed_at": "2022-06-11T13:34:00Z",
|
|
"stargazers_count": 1,
|
|
"watchers_count": 1,
|
|
"forks_count": 2,
|
|
"allow_forking": true,
|
|
"is_template": false,
|
|
"web_commit_signoff_required": false,
|
|
"topics": [],
|
|
"visibility": "public",
|
|
"forks": 2,
|
|
"watchers": 1,
|
|
"score": 0
|
|
},
|
|
{
|
|
"id": 420407065,
|
|
"name": "cve-2021-41773",
|
|
"full_name": "walnutsecurity\/cve-2021-41773",
|
|
"owner": {
|
|
"login": "walnutsecurity",
|
|
"id": 92915142,
|
|
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/92915142?v=4",
|
|
"html_url": "https:\/\/github.com\/walnutsecurity"
|
|
},
|
|
"html_url": "https:\/\/github.com\/walnutsecurity\/cve-2021-41773",
|
|
"description": "cve-2021-41773.py is a python script that will help in finding Path Traversal or Remote Code Execution vulnerability in Apache 2.4.49",
|
|
"fork": false,
|
|
"created_at": "2021-10-23T12:31:53Z",
|
|
"updated_at": "2021-11-25T09:32:45Z",
|
|
"pushed_at": "2022-05-26T08:34:39Z",
|
|
"stargazers_count": 0,
|
|
"watchers_count": 0,
|
|
"forks_count": 1,
|
|
"allow_forking": true,
|
|
"is_template": false,
|
|
"web_commit_signoff_required": false,
|
|
"topics": [],
|
|
"visibility": "public",
|
|
"forks": 1,
|
|
"watchers": 0,
|
|
"score": 0
|
|
},
|
|
{
|
|
"id": 447314257,
|
|
"name": "CVE-2021-41773-exploiter",
|
|
"full_name": "norrig\/CVE-2021-41773-exploiter",
|
|
"owner": {
|
|
"login": "norrig",
|
|
"id": 5526261,
|
|
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/5526261?v=4",
|
|
"html_url": "https:\/\/github.com\/norrig"
|
|
},
|
|
"html_url": "https:\/\/github.com\/norrig\/CVE-2021-41773-exploiter",
|
|
"description": "School project - Please use other repos for actual testing",
|
|
"fork": false,
|
|
"created_at": "2022-01-12T17:42:36Z",
|
|
"updated_at": "2022-01-12T18:26:57Z",
|
|
"pushed_at": "2022-01-13T16:18:33Z",
|
|
"stargazers_count": 0,
|
|
"watchers_count": 0,
|
|
"forks_count": 0,
|
|
"allow_forking": true,
|
|
"is_template": false,
|
|
"web_commit_signoff_required": false,
|
|
"topics": [],
|
|
"visibility": "public",
|
|
"forks": 0,
|
|
"watchers": 0,
|
|
"score": 0
|
|
},
|
|
{
|
|
"id": 452242021,
|
|
"name": "CVE-2021-41773-exercise",
|
|
"full_name": "m96dg\/CVE-2021-41773-exercise",
|
|
"owner": {
|
|
"login": "m96dg",
|
|
"id": 65173648,
|
|
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/65173648?v=4",
|
|
"html_url": "https:\/\/github.com\/m96dg"
|
|
},
|
|
"html_url": "https:\/\/github.com\/m96dg\/CVE-2021-41773-exercise",
|
|
"description": "A flaw was found in a change made to path normalization in Apache HTTP Server 2.4.49. An attacker could use a path traversal attack to map URLs to files outside the directories configured by Alias-like directives. If files outside of these directories are not protected by the usual default configuration \"require all denied\", these requests can succeed. If CGI scripts are also enabled for these aliased pathes, this could allow for remote code execution. This issue only affects Apache 2.4.49 and not earlier versions. Credits to: https:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2021-41773 ",
|
|
"fork": false,
|
|
"created_at": "2022-01-26T11:02:46Z",
|
|
"updated_at": "2022-01-26T11:22:13Z",
|
|
"pushed_at": "2022-01-30T19:02:43Z",
|
|
"stargazers_count": 0,
|
|
"watchers_count": 0,
|
|
"forks_count": 0,
|
|
"allow_forking": true,
|
|
"is_template": false,
|
|
"web_commit_signoff_required": false,
|
|
"topics": [],
|
|
"visibility": "public",
|
|
"forks": 0,
|
|
"watchers": 0,
|
|
"score": 0
|
|
},
|
|
{
|
|
"id": 464271089,
|
|
"name": "CVE-2021-41773",
|
|
"full_name": "skentagon\/CVE-2021-41773",
|
|
"owner": {
|
|
"login": "skentagon",
|
|
"id": 49702576,
|
|
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/49702576?v=4",
|
|
"html_url": "https:\/\/github.com\/skentagon"
|
|
},
|
|
"html_url": "https:\/\/github.com\/skentagon\/CVE-2021-41773",
|
|
"description": null,
|
|
"fork": false,
|
|
"created_at": "2022-02-27T22:39:58Z",
|
|
"updated_at": "2022-03-04T00:11:58Z",
|
|
"pushed_at": "2022-03-04T00:05:44Z",
|
|
"stargazers_count": 0,
|
|
"watchers_count": 0,
|
|
"forks_count": 0,
|
|
"allow_forking": true,
|
|
"is_template": false,
|
|
"web_commit_signoff_required": false,
|
|
"topics": [],
|
|
"visibility": "public",
|
|
"forks": 0,
|
|
"watchers": 0,
|
|
"score": 0
|
|
},
|
|
{
|
|
"id": 467687901,
|
|
"name": "CVE-2021-41773",
|
|
"full_name": "mauricelambert\/CVE-2021-41773",
|
|
"owner": {
|
|
"login": "mauricelambert",
|
|
"id": 50479118,
|
|
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/50479118?v=4",
|
|
"html_url": "https:\/\/github.com\/mauricelambert"
|
|
},
|
|
"html_url": "https:\/\/github.com\/mauricelambert\/CVE-2021-41773",
|
|
"description": "These Metasploit, Nmap, Python and Ruby scripts detects and exploits CVE-2021-41773 with RCE and local file disclosure.",
|
|
"fork": false,
|
|
"created_at": "2022-03-08T21:55:53Z",
|
|
"updated_at": "2022-03-23T16:56:34Z",
|
|
"pushed_at": "2022-03-14T07:34:49Z",
|
|
"stargazers_count": 1,
|
|
"watchers_count": 1,
|
|
"forks_count": 2,
|
|
"allow_forking": true,
|
|
"is_template": false,
|
|
"web_commit_signoff_required": false,
|
|
"topics": [
|
|
"cve",
|
|
"cve-2021-41773",
|
|
"detection",
|
|
"exploit",
|
|
"metasploit",
|
|
"nmap",
|
|
"python3",
|
|
"rce",
|
|
"ruby",
|
|
"scanner",
|
|
"vulnerability"
|
|
],
|
|
"visibility": "public",
|
|
"forks": 2,
|
|
"watchers": 1,
|
|
"score": 0
|
|
},
|
|
{
|
|
"id": 468909402,
|
|
"name": "CVE-2021-41773",
|
|
"full_name": "the29a\/CVE-2021-41773",
|
|
"owner": {
|
|
"login": "the29a",
|
|
"id": 4436697,
|
|
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/4436697?v=4",
|
|
"html_url": "https:\/\/github.com\/the29a"
|
|
},
|
|
"html_url": "https:\/\/github.com\/the29a\/CVE-2021-41773",
|
|
"description": "Small PoC of CVE-2021-41773",
|
|
"fork": false,
|
|
"created_at": "2022-03-11T21:50:35Z",
|
|
"updated_at": "2022-03-11T21:52:35Z",
|
|
"pushed_at": "2022-03-11T22:10:25Z",
|
|
"stargazers_count": 0,
|
|
"watchers_count": 0,
|
|
"forks_count": 0,
|
|
"allow_forking": true,
|
|
"is_template": false,
|
|
"web_commit_signoff_required": false,
|
|
"topics": [],
|
|
"visibility": "public",
|
|
"forks": 0,
|
|
"watchers": 0,
|
|
"score": 0
|
|
},
|
|
{
|
|
"id": 469203660,
|
|
"name": "CVE-2021-41773",
|
|
"full_name": "thehackersbrain\/CVE-2021-41773",
|
|
"owner": {
|
|
"login": "thehackersbrain",
|
|
"id": 36809025,
|
|
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/36809025?v=4",
|
|
"html_url": "https:\/\/github.com\/thehackersbrain"
|
|
},
|
|
"html_url": "https:\/\/github.com\/thehackersbrain\/CVE-2021-41773",
|
|
"description": "Apache2 2.4.49 - LFI & RCE Exploit - CVE-2021-41773",
|
|
"fork": false,
|
|
"created_at": "2022-03-12T21:24:55Z",
|
|
"updated_at": "2022-09-22T10:14:32Z",
|
|
"pushed_at": "2022-03-12T21:30:58Z",
|
|
"stargazers_count": 52,
|
|
"watchers_count": 52,
|
|
"forks_count": 21,
|
|
"allow_forking": true,
|
|
"is_template": false,
|
|
"web_commit_signoff_required": false,
|
|
"topics": [
|
|
"apache2",
|
|
"cve-2021-41773",
|
|
"exploit",
|
|
"gauravraj",
|
|
"lfi",
|
|
"python",
|
|
"rce",
|
|
"thehackersbrain"
|
|
],
|
|
"visibility": "public",
|
|
"forks": 21,
|
|
"watchers": 52,
|
|
"score": 0
|
|
},
|
|
{
|
|
"id": 469576020,
|
|
"name": "CVE-2021-41773",
|
|
"full_name": "honypot\/CVE-2021-41773",
|
|
"owner": {
|
|
"login": "honypot",
|
|
"id": 101309325,
|
|
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/101309325?v=4",
|
|
"html_url": "https:\/\/github.com\/honypot"
|
|
},
|
|
"html_url": "https:\/\/github.com\/honypot\/CVE-2021-41773",
|
|
"description": null,
|
|
"fork": false,
|
|
"created_at": "2022-03-14T04:08:56Z",
|
|
"updated_at": "2022-03-14T04:09:11Z",
|
|
"pushed_at": "2022-03-14T04:09:05Z",
|
|
"stargazers_count": 0,
|
|
"watchers_count": 0,
|
|
"forks_count": 0,
|
|
"allow_forking": true,
|
|
"is_template": false,
|
|
"web_commit_signoff_required": false,
|
|
"topics": [],
|
|
"visibility": "public",
|
|
"forks": 0,
|
|
"watchers": 0,
|
|
"score": 0
|
|
},
|
|
{
|
|
"id": 469821841,
|
|
"name": "CVE-2021-41773",
|
|
"full_name": "Fa1c0n35\/CVE-2021-41773",
|
|
"owner": {
|
|
"login": "Fa1c0n35",
|
|
"id": 33335488,
|
|
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/33335488?v=4",
|
|
"html_url": "https:\/\/github.com\/Fa1c0n35"
|
|
},
|
|
"html_url": "https:\/\/github.com\/Fa1c0n35\/CVE-2021-41773",
|
|
"description": null,
|
|
"fork": false,
|
|
"created_at": "2022-03-14T16:43:49Z",
|
|
"updated_at": "2022-03-14T16:44:00Z",
|
|
"pushed_at": "2022-03-14T16:43:57Z",
|
|
"stargazers_count": 0,
|
|
"watchers_count": 0,
|
|
"forks_count": 0,
|
|
"allow_forking": true,
|
|
"is_template": false,
|
|
"web_commit_signoff_required": false,
|
|
"topics": [],
|
|
"visibility": "public",
|
|
"forks": 0,
|
|
"watchers": 0,
|
|
"score": 0
|
|
},
|
|
{
|
|
"id": 474747864,
|
|
"name": "CVE-2021-41773-",
|
|
"full_name": "N3w-elf\/CVE-2021-41773-",
|
|
"owner": {
|
|
"login": "N3w-elf",
|
|
"id": 80478753,
|
|
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/80478753?v=4",
|
|
"html_url": "https:\/\/github.com\/N3w-elf"
|
|
},
|
|
"html_url": "https:\/\/github.com\/N3w-elf\/CVE-2021-41773-",
|
|
"description": null,
|
|
"fork": false,
|
|
"created_at": "2022-03-27T20:10:30Z",
|
|
"updated_at": "2022-03-27T20:10:30Z",
|
|
"pushed_at": "2022-03-27T20:10:31Z",
|
|
"stargazers_count": 0,
|
|
"watchers_count": 0,
|
|
"forks_count": 0,
|
|
"allow_forking": true,
|
|
"is_template": false,
|
|
"web_commit_signoff_required": false,
|
|
"topics": [],
|
|
"visibility": "public",
|
|
"forks": 0,
|
|
"watchers": 0,
|
|
"score": 0
|
|
},
|
|
{
|
|
"id": 474963195,
|
|
"name": "CVE-2021-41773",
|
|
"full_name": "puckiestyle\/CVE-2021-41773",
|
|
"owner": {
|
|
"login": "puckiestyle",
|
|
"id": 57447087,
|
|
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/57447087?v=4",
|
|
"html_url": "https:\/\/github.com\/puckiestyle"
|
|
},
|
|
"html_url": "https:\/\/github.com\/puckiestyle\/CVE-2021-41773",
|
|
"description": null,
|
|
"fork": false,
|
|
"created_at": "2022-03-28T11:02:46Z",
|
|
"updated_at": "2022-03-28T11:03:00Z",
|
|
"pushed_at": "2022-03-28T11:41:55Z",
|
|
"stargazers_count": 0,
|
|
"watchers_count": 0,
|
|
"forks_count": 0,
|
|
"allow_forking": true,
|
|
"is_template": false,
|
|
"web_commit_signoff_required": false,
|
|
"topics": [],
|
|
"visibility": "public",
|
|
"forks": 0,
|
|
"watchers": 0,
|
|
"score": 0
|
|
},
|
|
{
|
|
"id": 475931011,
|
|
"name": "CVE-2021-41773",
|
|
"full_name": "WynSon\/CVE-2021-41773",
|
|
"owner": {
|
|
"login": "WynSon",
|
|
"id": 83699106,
|
|
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/83699106?v=4",
|
|
"html_url": "https:\/\/github.com\/WynSon"
|
|
},
|
|
"html_url": "https:\/\/github.com\/WynSon\/CVE-2021-41773",
|
|
"description": null,
|
|
"fork": false,
|
|
"created_at": "2022-03-30T15:04:27Z",
|
|
"updated_at": "2022-03-30T17:46:13Z",
|
|
"pushed_at": "2022-04-14T21:54:47Z",
|
|
"stargazers_count": 0,
|
|
"watchers_count": 0,
|
|
"forks_count": 0,
|
|
"allow_forking": true,
|
|
"is_template": false,
|
|
"web_commit_signoff_required": false,
|
|
"topics": [],
|
|
"visibility": "public",
|
|
"forks": 0,
|
|
"watchers": 0,
|
|
"score": 0
|
|
},
|
|
{
|
|
"id": 476112666,
|
|
"name": "Reserch-CVE-2021-41773",
|
|
"full_name": "DoTuan1\/Reserch-CVE-2021-41773",
|
|
"owner": {
|
|
"login": "DoTuan1",
|
|
"id": 63194321,
|
|
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/63194321?v=4",
|
|
"html_url": "https:\/\/github.com\/DoTuan1"
|
|
},
|
|
"html_url": "https:\/\/github.com\/DoTuan1\/Reserch-CVE-2021-41773",
|
|
"description": null,
|
|
"fork": false,
|
|
"created_at": "2022-03-31T01:48:33Z",
|
|
"updated_at": "2022-03-31T01:54:45Z",
|
|
"pushed_at": "2022-03-31T03:03:09Z",
|
|
"stargazers_count": 0,
|
|
"watchers_count": 0,
|
|
"forks_count": 0,
|
|
"allow_forking": true,
|
|
"is_template": false,
|
|
"web_commit_signoff_required": false,
|
|
"topics": [],
|
|
"visibility": "public",
|
|
"forks": 0,
|
|
"watchers": 0,
|
|
"score": 0
|
|
},
|
|
{
|
|
"id": 477111512,
|
|
"name": "netsec-polygon",
|
|
"full_name": "bernardas\/netsec-polygon",
|
|
"owner": {
|
|
"login": "bernardas",
|
|
"id": 62701131,
|
|
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/62701131?v=4",
|
|
"html_url": "https:\/\/github.com\/bernardas"
|
|
},
|
|
"html_url": "https:\/\/github.com\/bernardas\/netsec-polygon",
|
|
"description": "Environment for CVE-2021-41773 recreation.",
|
|
"fork": false,
|
|
"created_at": "2022-04-02T16:34:45Z",
|
|
"updated_at": "2022-04-03T08:19:39Z",
|
|
"pushed_at": "2022-05-17T22:16:34Z",
|
|
"stargazers_count": 0,
|
|
"watchers_count": 0,
|
|
"forks_count": 0,
|
|
"allow_forking": true,
|
|
"is_template": false,
|
|
"web_commit_signoff_required": false,
|
|
"topics": [],
|
|
"visibility": "public",
|
|
"forks": 0,
|
|
"watchers": 0,
|
|
"score": 0
|
|
},
|
|
{
|
|
"id": 477889492,
|
|
"name": "Path-traversal-RCE-Apache-2.4.49-2.4.50-Exploit",
|
|
"full_name": "CalfCrusher\/Path-traversal-RCE-Apache-2.4.49-2.4.50-Exploit",
|
|
"owner": {
|
|
"login": "CalfCrusher",
|
|
"id": 5812023,
|
|
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/5812023?v=4",
|
|
"html_url": "https:\/\/github.com\/CalfCrusher"
|
|
},
|
|
"html_url": "https:\/\/github.com\/CalfCrusher\/Path-traversal-RCE-Apache-2.4.49-2.4.50-Exploit",
|
|
"description": "CVE-2021-41773 | CVE-2021-42013 Exploit Tool (Apache\/2.4.49-2.4.50)",
|
|
"fork": false,
|
|
"created_at": "2022-04-04T22:07:21Z",
|
|
"updated_at": "2022-04-05T05:17:33Z",
|
|
"pushed_at": "2022-04-08T09:24:35Z",
|
|
"stargazers_count": 1,
|
|
"watchers_count": 1,
|
|
"forks_count": 1,
|
|
"allow_forking": true,
|
|
"is_template": false,
|
|
"web_commit_signoff_required": false,
|
|
"topics": [
|
|
"cve-2021-41773",
|
|
"cve-2021-42013",
|
|
"exploit"
|
|
],
|
|
"visibility": "public",
|
|
"forks": 1,
|
|
"watchers": 1,
|
|
"score": 0
|
|
},
|
|
{
|
|
"id": 478605535,
|
|
"name": "cve-2021-41773",
|
|
"full_name": "vuongnv3389-sec\/cve-2021-41773",
|
|
"owner": {
|
|
"login": "vuongnv3389-sec",
|
|
"id": 64488431,
|
|
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/64488431?v=4",
|
|
"html_url": "https:\/\/github.com\/vuongnv3389-sec"
|
|
},
|
|
"html_url": "https:\/\/github.com\/vuongnv3389-sec\/cve-2021-41773",
|
|
"description": null,
|
|
"fork": false,
|
|
"created_at": "2022-04-06T14:53:19Z",
|
|
"updated_at": "2022-04-06T14:54:12Z",
|
|
"pushed_at": "2022-04-06T15:41:47Z",
|
|
"stargazers_count": 0,
|
|
"watchers_count": 0,
|
|
"forks_count": 0,
|
|
"allow_forking": true,
|
|
"is_template": false,
|
|
"web_commit_signoff_required": false,
|
|
"topics": [],
|
|
"visibility": "public",
|
|
"forks": 0,
|
|
"watchers": 0,
|
|
"score": 0
|
|
},
|
|
{
|
|
"id": 480821526,
|
|
"name": "CVE-2021-41773",
|
|
"full_name": "Chocapikk\/CVE-2021-41773",
|
|
"owner": {
|
|
"login": "Chocapikk",
|
|
"id": 88535377,
|
|
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/88535377?v=4",
|
|
"html_url": "https:\/\/github.com\/Chocapikk"
|
|
},
|
|
"html_url": "https:\/\/github.com\/Chocapikk\/CVE-2021-41773",
|
|
"description": null,
|
|
"fork": false,
|
|
"created_at": "2022-04-12T13:25:58Z",
|
|
"updated_at": "2022-04-19T17:03:53Z",
|
|
"pushed_at": "2022-04-12T13:26:22Z",
|
|
"stargazers_count": 1,
|
|
"watchers_count": 1,
|
|
"forks_count": 0,
|
|
"allow_forking": true,
|
|
"is_template": false,
|
|
"web_commit_signoff_required": false,
|
|
"topics": [],
|
|
"visibility": "public",
|
|
"forks": 0,
|
|
"watchers": 1,
|
|
"score": 0
|
|
},
|
|
{
|
|
"id": 486245191,
|
|
"name": "Apache_Penetration_Tool",
|
|
"full_name": "wangfly-me\/Apache_Penetration_Tool",
|
|
"owner": {
|
|
"login": "wangfly-me",
|
|
"id": 25388540,
|
|
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/25388540?v=4",
|
|
"html_url": "https:\/\/github.com\/wangfly-me"
|
|
},
|
|
"html_url": "https:\/\/github.com\/wangfly-me\/Apache_Penetration_Tool",
|
|
"description": "CVE-2021-41773&CVE-2021-42013图形化漏洞检测利用工具",
|
|
"fork": false,
|
|
"created_at": "2022-04-27T15:17:38Z",
|
|
"updated_at": "2022-05-23T03:30:13Z",
|
|
"pushed_at": "2022-07-17T14:04:16Z",
|
|
"stargazers_count": 3,
|
|
"watchers_count": 3,
|
|
"forks_count": 0,
|
|
"allow_forking": true,
|
|
"is_template": false,
|
|
"web_commit_signoff_required": false,
|
|
"topics": [],
|
|
"visibility": "public",
|
|
"forks": 0,
|
|
"watchers": 3,
|
|
"score": 0
|
|
},
|
|
{
|
|
"id": 500809753,
|
|
"name": "CVE-2021-41773",
|
|
"full_name": "hab1b0x\/CVE-2021-41773",
|
|
"owner": {
|
|
"login": "hab1b0x",
|
|
"id": 24976957,
|
|
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/24976957?v=4",
|
|
"html_url": "https:\/\/github.com\/hab1b0x"
|
|
},
|
|
"html_url": "https:\/\/github.com\/hab1b0x\/CVE-2021-41773",
|
|
"description": "CVE-2021-41773 | Apache HTTP Server 2.4.49 is vulnerable to Path Traversal and Remote Code execution attacks ",
|
|
"fork": false,
|
|
"created_at": "2022-06-07T11:22:08Z",
|
|
"updated_at": "2022-07-06T09:28:44Z",
|
|
"pushed_at": "2022-06-07T11:23:40Z",
|
|
"stargazers_count": 2,
|
|
"watchers_count": 2,
|
|
"forks_count": 1,
|
|
"allow_forking": true,
|
|
"is_template": false,
|
|
"web_commit_signoff_required": false,
|
|
"topics": [],
|
|
"visibility": "public",
|
|
"forks": 1,
|
|
"watchers": 2,
|
|
"score": 0
|
|
},
|
|
{
|
|
"id": 504547542,
|
|
"name": "CVE-2021-41773-Apache-RCE",
|
|
"full_name": "pwn3z\/CVE-2021-41773-Apache-RCE",
|
|
"owner": {
|
|
"login": "pwn3z",
|
|
"id": 71440287,
|
|
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/71440287?v=4",
|
|
"html_url": "https:\/\/github.com\/pwn3z"
|
|
},
|
|
"html_url": "https:\/\/github.com\/pwn3z\/CVE-2021-41773-Apache-RCE",
|
|
"description": "A flaw was found in a change made to path normalization in Apache HTTP Server 2.4.49. An attacker could use a path traversal attack to map URLs to files outside the directories configured by Alias-like directives. If files outside of these directories are not protected by the usual default configuration \"require all denied\", these requests can succeed. If CGI scripts are also enabled for these aliased pathes, this could allow for remote code execution. This issue is known to be exploited in the wild. This issue only affects Apache 2.4.49 and not earlier versions. The fix in Apache HTTP Server 2.4.50 was found to be incomplete, see CVE-2021-42013.",
|
|
"fork": false,
|
|
"created_at": "2022-06-17T13:36:42Z",
|
|
"updated_at": "2022-06-17T13:38:47Z",
|
|
"pushed_at": "2022-06-17T13:39:38Z",
|
|
"stargazers_count": 0,
|
|
"watchers_count": 0,
|
|
"forks_count": 0,
|
|
"allow_forking": true,
|
|
"is_template": false,
|
|
"web_commit_signoff_required": false,
|
|
"topics": [],
|
|
"visibility": "public",
|
|
"forks": 0,
|
|
"watchers": 0,
|
|
"score": 0
|
|
},
|
|
{
|
|
"id": 516684881,
|
|
"name": "Mitigation-Apache-CVE-2021-41773-",
|
|
"full_name": "EkamSinghWalia\/Mitigation-Apache-CVE-2021-41773-",
|
|
"owner": {
|
|
"login": "EkamSinghWalia",
|
|
"id": 106553324,
|
|
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/106553324?v=4",
|
|
"html_url": "https:\/\/github.com\/EkamSinghWalia"
|
|
},
|
|
"html_url": "https:\/\/github.com\/EkamSinghWalia\/Mitigation-Apache-CVE-2021-41773-",
|
|
"description": "Mitigation\/fix of CVE-2021-41773 A Path Traversal And File Disclosure Vulnerability In Apache",
|
|
"fork": false,
|
|
"created_at": "2022-07-22T09:11:47Z",
|
|
"updated_at": "2022-07-22T09:29:20Z",
|
|
"pushed_at": "2022-07-22T14:59:37Z",
|
|
"stargazers_count": 0,
|
|
"watchers_count": 0,
|
|
"forks_count": 0,
|
|
"allow_forking": true,
|
|
"is_template": false,
|
|
"web_commit_signoff_required": false,
|
|
"topics": [],
|
|
"visibility": "public",
|
|
"forks": 0,
|
|
"watchers": 0,
|
|
"score": 0
|
|
},
|
|
{
|
|
"id": 521335808,
|
|
"name": "CVE-2021-41773",
|
|
"full_name": "Plunder283\/CVE-2021-41773",
|
|
"owner": {
|
|
"login": "Plunder283",
|
|
"id": 87617893,
|
|
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/87617893?v=4",
|
|
"html_url": "https:\/\/github.com\/Plunder283"
|
|
},
|
|
"html_url": "https:\/\/github.com\/Plunder283\/CVE-2021-41773",
|
|
"description": "CVE-2021-41773 Gaurav Raj's exploit modified by Plunder",
|
|
"fork": false,
|
|
"created_at": "2022-08-04T16:19:42Z",
|
|
"updated_at": "2022-08-04T16:33:22Z",
|
|
"pushed_at": "2022-08-04T16:34:38Z",
|
|
"stargazers_count": 0,
|
|
"watchers_count": 0,
|
|
"forks_count": 0,
|
|
"allow_forking": true,
|
|
"is_template": false,
|
|
"web_commit_signoff_required": false,
|
|
"topics": [],
|
|
"visibility": "public",
|
|
"forks": 0,
|
|
"watchers": 0,
|
|
"score": 0
|
|
},
|
|
{
|
|
"id": 536947281,
|
|
"name": "cve-2021-41773",
|
|
"full_name": "mightysai1997\/cve-2021-41773",
|
|
"owner": {
|
|
"login": "mightysai1997",
|
|
"id": 110396758,
|
|
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/110396758?v=4",
|
|
"html_url": "https:\/\/github.com\/mightysai1997"
|
|
},
|
|
"html_url": "https:\/\/github.com\/mightysai1997\/cve-2021-41773",
|
|
"description": null,
|
|
"fork": false,
|
|
"created_at": "2022-09-15T09:08:58Z",
|
|
"updated_at": "2022-09-15T09:09:16Z",
|
|
"pushed_at": "2022-09-15T09:09:11Z",
|
|
"stargazers_count": 0,
|
|
"watchers_count": 0,
|
|
"forks_count": 0,
|
|
"allow_forking": true,
|
|
"is_template": false,
|
|
"web_commit_signoff_required": false,
|
|
"topics": [],
|
|
"visibility": "public",
|
|
"forks": 0,
|
|
"watchers": 0,
|
|
"score": 0
|
|
},
|
|
{
|
|
"id": 536953912,
|
|
"name": "CVE-2021-41773h",
|
|
"full_name": "mightysai1997\/CVE-2021-41773h",
|
|
"owner": {
|
|
"login": "mightysai1997",
|
|
"id": 110396758,
|
|
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/110396758?v=4",
|
|
"html_url": "https:\/\/github.com\/mightysai1997"
|
|
},
|
|
"html_url": "https:\/\/github.com\/mightysai1997\/CVE-2021-41773h",
|
|
"description": null,
|
|
"fork": false,
|
|
"created_at": "2022-09-15T09:27:04Z",
|
|
"updated_at": "2022-09-15T09:27:22Z",
|
|
"pushed_at": "2022-09-15T09:27:19Z",
|
|
"stargazers_count": 0,
|
|
"watchers_count": 0,
|
|
"forks_count": 0,
|
|
"allow_forking": true,
|
|
"is_template": false,
|
|
"web_commit_signoff_required": false,
|
|
"topics": [],
|
|
"visibility": "public",
|
|
"forks": 0,
|
|
"watchers": 0,
|
|
"score": 0
|
|
},
|
|
{
|
|
"id": 536957144,
|
|
"name": "cve-2021-41773-v-",
|
|
"full_name": "mightysai1997\/cve-2021-41773-v-",
|
|
"owner": {
|
|
"login": "mightysai1997",
|
|
"id": 110396758,
|
|
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/110396758?v=4",
|
|
"html_url": "https:\/\/github.com\/mightysai1997"
|
|
},
|
|
"html_url": "https:\/\/github.com\/mightysai1997\/cve-2021-41773-v-",
|
|
"description": null,
|
|
"fork": false,
|
|
"created_at": "2022-09-15T09:36:17Z",
|
|
"updated_at": "2022-09-15T09:36:35Z",
|
|
"pushed_at": "2022-09-15T09:36:30Z",
|
|
"stargazers_count": 0,
|
|
"watchers_count": 0,
|
|
"forks_count": 0,
|
|
"allow_forking": true,
|
|
"is_template": false,
|
|
"web_commit_signoff_required": false,
|
|
"topics": [],
|
|
"visibility": "public",
|
|
"forks": 0,
|
|
"watchers": 0,
|
|
"score": 0
|
|
},
|
|
{
|
|
"id": 536957769,
|
|
"name": "CVE-2021-41773-i-",
|
|
"full_name": "mightysai1997\/CVE-2021-41773-i-",
|
|
"owner": {
|
|
"login": "mightysai1997",
|
|
"id": 110396758,
|
|
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/110396758?v=4",
|
|
"html_url": "https:\/\/github.com\/mightysai1997"
|
|
},
|
|
"html_url": "https:\/\/github.com\/mightysai1997\/CVE-2021-41773-i-",
|
|
"description": null,
|
|
"fork": false,
|
|
"created_at": "2022-09-15T09:38:04Z",
|
|
"updated_at": "2022-09-15T09:38:16Z",
|
|
"pushed_at": "2022-09-15T09:38:13Z",
|
|
"stargazers_count": 0,
|
|
"watchers_count": 0,
|
|
"forks_count": 0,
|
|
"allow_forking": true,
|
|
"is_template": false,
|
|
"web_commit_signoff_required": false,
|
|
"topics": [],
|
|
"visibility": "public",
|
|
"forks": 0,
|
|
"watchers": 0,
|
|
"score": 0
|
|
},
|
|
{
|
|
"id": 536968315,
|
|
"name": "CVE-2021-41773-L-",
|
|
"full_name": "mightysai1997\/CVE-2021-41773-L-",
|
|
"owner": {
|
|
"login": "mightysai1997",
|
|
"id": 110396758,
|
|
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/110396758?v=4",
|
|
"html_url": "https:\/\/github.com\/mightysai1997"
|
|
},
|
|
"html_url": "https:\/\/github.com\/mightysai1997\/CVE-2021-41773-L-",
|
|
"description": null,
|
|
"fork": false,
|
|
"created_at": "2022-09-15T10:08:36Z",
|
|
"updated_at": "2022-09-15T10:08:51Z",
|
|
"pushed_at": "2022-09-15T10:08:46Z",
|
|
"stargazers_count": 0,
|
|
"watchers_count": 0,
|
|
"forks_count": 0,
|
|
"allow_forking": true,
|
|
"is_template": false,
|
|
"web_commit_signoff_required": false,
|
|
"topics": [],
|
|
"visibility": "public",
|
|
"forks": 0,
|
|
"watchers": 0,
|
|
"score": 0
|
|
},
|
|
{
|
|
"id": 536985771,
|
|
"name": "CVE-2021-41773-PoC",
|
|
"full_name": "mightysai1997\/CVE-2021-41773-PoC",
|
|
"owner": {
|
|
"login": "mightysai1997",
|
|
"id": 110396758,
|
|
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/110396758?v=4",
|
|
"html_url": "https:\/\/github.com\/mightysai1997"
|
|
},
|
|
"html_url": "https:\/\/github.com\/mightysai1997\/CVE-2021-41773-PoC",
|
|
"description": null,
|
|
"fork": false,
|
|
"created_at": "2022-09-15T11:01:45Z",
|
|
"updated_at": "2022-09-15T11:02:07Z",
|
|
"pushed_at": "2022-09-15T11:02:02Z",
|
|
"stargazers_count": 0,
|
|
"watchers_count": 0,
|
|
"forks_count": 0,
|
|
"allow_forking": true,
|
|
"is_template": false,
|
|
"web_commit_signoff_required": false,
|
|
"topics": [],
|
|
"visibility": "public",
|
|
"forks": 0,
|
|
"watchers": 0,
|
|
"score": 0
|
|
},
|
|
{
|
|
"id": 537018809,
|
|
"name": "CVE-2021-41773.git1",
|
|
"full_name": "mightysai1997\/CVE-2021-41773.git1",
|
|
"owner": {
|
|
"login": "mightysai1997",
|
|
"id": 110396758,
|
|
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/110396758?v=4",
|
|
"html_url": "https:\/\/github.com\/mightysai1997"
|
|
},
|
|
"html_url": "https:\/\/github.com\/mightysai1997\/CVE-2021-41773.git1",
|
|
"description": null,
|
|
"fork": false,
|
|
"created_at": "2022-09-15T12:35:06Z",
|
|
"updated_at": "2022-09-15T12:35:18Z",
|
|
"pushed_at": "2022-09-15T12:35:14Z",
|
|
"stargazers_count": 0,
|
|
"watchers_count": 0,
|
|
"forks_count": 0,
|
|
"allow_forking": true,
|
|
"is_template": false,
|
|
"web_commit_signoff_required": false,
|
|
"topics": [],
|
|
"visibility": "public",
|
|
"forks": 0,
|
|
"watchers": 0,
|
|
"score": 0
|
|
},
|
|
{
|
|
"id": 537019898,
|
|
"name": "CVE-2021-41773m",
|
|
"full_name": "mightysai1997\/CVE-2021-41773m",
|
|
"owner": {
|
|
"login": "mightysai1997",
|
|
"id": 110396758,
|
|
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/110396758?v=4",
|
|
"html_url": "https:\/\/github.com\/mightysai1997"
|
|
},
|
|
"html_url": "https:\/\/github.com\/mightysai1997\/CVE-2021-41773m",
|
|
"description": null,
|
|
"fork": false,
|
|
"created_at": "2022-09-15T12:37:59Z",
|
|
"updated_at": "2022-09-16T01:01:18Z",
|
|
"pushed_at": "2022-09-15T12:38:09Z",
|
|
"stargazers_count": 1,
|
|
"watchers_count": 1,
|
|
"forks_count": 0,
|
|
"allow_forking": true,
|
|
"is_template": false,
|
|
"web_commit_signoff_required": false,
|
|
"topics": [],
|
|
"visibility": "public",
|
|
"forks": 0,
|
|
"watchers": 1,
|
|
"score": 0
|
|
},
|
|
{
|
|
"id": 537060189,
|
|
"name": "CVE-2021-41773S",
|
|
"full_name": "mightysai1997\/CVE-2021-41773S",
|
|
"owner": {
|
|
"login": "mightysai1997",
|
|
"id": 110396758,
|
|
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/110396758?v=4",
|
|
"html_url": "https:\/\/github.com\/mightysai1997"
|
|
},
|
|
"html_url": "https:\/\/github.com\/mightysai1997\/CVE-2021-41773S",
|
|
"description": null,
|
|
"fork": false,
|
|
"created_at": "2022-09-15T14:17:45Z",
|
|
"updated_at": "2022-09-16T01:01:16Z",
|
|
"pushed_at": "2022-09-15T14:17:56Z",
|
|
"stargazers_count": 1,
|
|
"watchers_count": 1,
|
|
"forks_count": 0,
|
|
"allow_forking": true,
|
|
"is_template": false,
|
|
"web_commit_signoff_required": false,
|
|
"topics": [],
|
|
"visibility": "public",
|
|
"forks": 0,
|
|
"watchers": 1,
|
|
"score": 0
|
|
},
|
|
{
|
|
"id": 538798099,
|
|
"name": "LayarKacaSiber-CVE-2021-41773",
|
|
"full_name": "dileepdkumar\/LayarKacaSiber-CVE-2021-41773",
|
|
"owner": {
|
|
"login": "dileepdkumar",
|
|
"id": 89115244,
|
|
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/89115244?v=4",
|
|
"html_url": "https:\/\/github.com\/dileepdkumar"
|
|
},
|
|
"html_url": "https:\/\/github.com\/dileepdkumar\/LayarKacaSiber-CVE-2021-41773",
|
|
"description": null,
|
|
"fork": false,
|
|
"created_at": "2022-09-20T03:45:24Z",
|
|
"updated_at": "2022-09-20T03:45:37Z",
|
|
"pushed_at": "2022-09-20T03:45:32Z",
|
|
"stargazers_count": 0,
|
|
"watchers_count": 0,
|
|
"forks_count": 0,
|
|
"allow_forking": true,
|
|
"is_template": false,
|
|
"web_commit_signoff_required": false,
|
|
"topics": [],
|
|
"visibility": "public",
|
|
"forks": 0,
|
|
"watchers": 0,
|
|
"score": 0
|
|
}
|
|
] |