PoC-in-GitHub/2021/CVE-2021-41773.json
2022-03-27 03:14:33 +09:00

556 lines
No EOL
19 KiB
JSON
Raw Blame History

This file contains ambiguous Unicode characters

This file contains Unicode characters that might be confused with other characters. If you think that this is intentional, you can safely ignore this warning. Use the Escape button to reveal them.

[
{
"id": 413890827,
"name": "cve-2021-41773",
"full_name": "Vulnmachines\/cve-2021-41773",
"owner": {
"login": "Vulnmachines",
"id": 79006904,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/79006904?v=4",
"html_url": "https:\/\/github.com\/Vulnmachines"
},
"html_url": "https:\/\/github.com\/Vulnmachines\/cve-2021-41773",
"description": "CVE-2021-41773 Path Traversal vulnerability in Apache 2.4.49.",
"fork": false,
"created_at": "2021-10-05T16:13:38Z",
"updated_at": "2022-03-23T16:50:30Z",
"pushed_at": "2022-03-10T14:02:09Z",
"stargazers_count": 38,
"watchers_count": 38,
"forks_count": 11,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 11,
"watchers": 38,
"score": 0
},
{
"id": 413916846,
"name": "PoC-CVE-2021-41773",
"full_name": "iilegacyyii\/PoC-CVE-2021-41773",
"owner": {
"login": "iilegacyyii",
"id": 68760809,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/68760809?v=4",
"html_url": "https:\/\/github.com\/iilegacyyii"
},
"html_url": "https:\/\/github.com\/iilegacyyii\/PoC-CVE-2021-41773",
"description": null,
"fork": false,
"created_at": "2021-10-05T17:30:43Z",
"updated_at": "2022-03-16T11:34:06Z",
"pushed_at": "2021-11-24T12:57:46Z",
"stargazers_count": 40,
"watchers_count": 40,
"forks_count": 37,
"allow_forking": true,
"is_template": false,
"topics": [
"apache",
"cve",
"lfi",
"poc",
"rce"
],
"visibility": "public",
"forks": 37,
"watchers": 40,
"score": 0
},
{
"id": 414043746,
"name": "CVE-2021-41773_CVE-2021-42013",
"full_name": "Ls4ss\/CVE-2021-41773_CVE-2021-42013",
"owner": {
"login": "Ls4ss",
"id": 25537761,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/25537761?v=4",
"html_url": "https:\/\/github.com\/Ls4ss"
},
"html_url": "https:\/\/github.com\/Ls4ss\/CVE-2021-41773_CVE-2021-42013",
"description": "Apache HTTP Server 2.4.49, 2.4.50 - Path Traversal & RCE",
"fork": false,
"created_at": "2021-10-06T02:28:41Z",
"updated_at": "2022-03-14T15:59:57Z",
"pushed_at": "2021-12-22T23:54:18Z",
"stargazers_count": 19,
"watchers_count": 19,
"forks_count": 8,
"allow_forking": true,
"is_template": false,
"topics": [
"apache",
"cve",
"exploit",
"payload",
"pentest",
"rce"
],
"visibility": "public",
"forks": 8,
"watchers": 19,
"score": 0
},
{
"id": 414804962,
"name": "CVE-2021-41773",
"full_name": "shellreaper\/CVE-2021-41773",
"owner": {
"login": "shellreaper",
"id": 76930483,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/76930483?v=4",
"html_url": "https:\/\/github.com\/shellreaper"
},
"html_url": "https:\/\/github.com\/shellreaper\/CVE-2021-41773",
"description": "This is a simple POC for Apache\/2.4.49 Path Traversal Vulnerability",
"fork": false,
"created_at": "2021-10-08T01:13:33Z",
"updated_at": "2021-11-12T00:05:10Z",
"pushed_at": "2021-11-12T00:03:34Z",
"stargazers_count": 4,
"watchers_count": 4,
"forks_count": 2,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 2,
"watchers": 4,
"score": 0
},
{
"id": 420407065,
"name": "cve-2021-41773",
"full_name": "walnutsecurity\/cve-2021-41773",
"owner": {
"login": "walnutsecurity",
"id": 92915142,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/92915142?v=4",
"html_url": "https:\/\/github.com\/walnutsecurity"
},
"html_url": "https:\/\/github.com\/walnutsecurity\/cve-2021-41773",
"description": "cve-2021-41773.py is a python script that will help in finding Path Traversal or Remote Code Execution vulnerability in Apache 2.4.49",
"fork": false,
"created_at": "2021-10-23T12:31:53Z",
"updated_at": "2021-11-25T09:32:45Z",
"pushed_at": "2021-11-25T09:32:43Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 0,
"score": 0
},
{
"id": 421553366,
"name": "CVE-2021-41773",
"full_name": "Balgogan\/CVE-2021-41773",
"owner": {
"login": "Balgogan",
"id": 88535377,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/88535377?v=4",
"html_url": "https:\/\/github.com\/Balgogan"
},
"html_url": "https:\/\/github.com\/Balgogan\/CVE-2021-41773",
"description": "Ce programme permet de détecter une faille RCE sur les serveurs Apache 2.4.49 et Apache 2.4.50",
"fork": false,
"created_at": "2021-10-26T19:11:28Z",
"updated_at": "2022-03-14T21:33:30Z",
"pushed_at": "2021-11-11T00:48:37Z",
"stargazers_count": 12,
"watchers_count": 12,
"forks_count": 4,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 4,
"watchers": 12,
"score": 0
},
{
"id": 424762276,
"name": "CVE-2021-41773-Playground",
"full_name": "Hydragyrum\/CVE-2021-41773-Playground",
"owner": {
"login": "Hydragyrum",
"id": 4928181,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/4928181?v=4",
"html_url": "https:\/\/github.com\/Hydragyrum"
},
"html_url": "https:\/\/github.com\/Hydragyrum\/CVE-2021-41773-Playground",
"description": "Some docker images to play with CVE-2021-41773 and CVE-2021-42013",
"fork": false,
"created_at": "2021-11-04T22:52:44Z",
"updated_at": "2022-01-11T09:06:38Z",
"pushed_at": "2021-11-04T22:56:14Z",
"stargazers_count": 5,
"watchers_count": 5,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 5,
"score": 0
},
{
"id": 426066790,
"name": "Apache-2.4.49-2.4.50-Traversal-Remote-Code-Execution-Exploit",
"full_name": "IcmpOff\/Apache-2.4.49-2.4.50-Traversal-Remote-Code-Execution-Exploit",
"owner": {
"login": "IcmpOff",
"id": 71145797,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/71145797?v=4",
"html_url": "https:\/\/github.com\/IcmpOff"
},
"html_url": "https:\/\/github.com\/IcmpOff\/Apache-2.4.49-2.4.50-Traversal-Remote-Code-Execution-Exploit",
"description": "This Metasploit module exploits an unauthenticated remote code execution vulnerability which exists in Apache version 2.4.49 (CVE-2021-41773). If files outside of the document root are not protected by require all denied and CGI has been explicitly enabled, it can be used to execute arbitrary commands. This vulnerability has been reintroduced in the Apache 2.4.50 fix (CVE-2021-42013).",
"fork": false,
"created_at": "2021-11-09T02:38:13Z",
"updated_at": "2021-11-09T02:42:52Z",
"pushed_at": "2021-11-09T02:39:22Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"topics": [
"apache",
"exploit",
"metasploit",
"metasploit-framework",
"metasploit-modules",
"rce"
],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0
},
{
"id": 427815832,
"name": "POC-CVE-2021-41773",
"full_name": "kubota\/POC-CVE-2021-41773",
"owner": {
"login": "kubota",
"id": 119277,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/119277?v=4",
"html_url": "https:\/\/github.com\/kubota"
},
"html_url": "https:\/\/github.com\/kubota\/POC-CVE-2021-41773",
"description": null,
"fork": false,
"created_at": "2021-11-14T02:02:45Z",
"updated_at": "2021-11-16T20:42:27Z",
"pushed_at": "2021-11-16T20:42:25Z",
"stargazers_count": 1,
"watchers_count": 1,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 1,
"score": 0
},
{
"id": 427956449,
"name": "CVE-2021-41773",
"full_name": "xMohamed0\/CVE-2021-41773",
"owner": {
"login": "xMohamed0",
"id": 94008154,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/94008154?v=4",
"html_url": "https:\/\/github.com\/xMohamed0"
},
"html_url": "https:\/\/github.com\/xMohamed0\/CVE-2021-41773",
"description": null,
"fork": false,
"created_at": "2021-11-14T14:50:45Z",
"updated_at": "2021-11-14T14:55:20Z",
"pushed_at": "2021-11-14T14:55:18Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0
},
{
"id": 438514241,
"name": "MASS_CVE-2021-41773",
"full_name": "i6c\/MASS_CVE-2021-41773",
"owner": {
"login": "i6c",
"id": 87837042,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/87837042?v=4",
"html_url": "https:\/\/github.com\/i6c"
},
"html_url": "https:\/\/github.com\/i6c\/MASS_CVE-2021-41773",
"description": null,
"fork": false,
"created_at": "2021-12-15T06:04:41Z",
"updated_at": "2021-12-24T17:27:13Z",
"pushed_at": "2021-12-15T06:06:53Z",
"stargazers_count": 3,
"watchers_count": 3,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 3,
"score": 0
},
{
"id": 447314257,
"name": "CVE-2021-41773-exploiter",
"full_name": "norrig\/CVE-2021-41773-exploiter",
"owner": {
"login": "norrig",
"id": 5526261,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/5526261?v=4",
"html_url": "https:\/\/github.com\/norrig"
},
"html_url": "https:\/\/github.com\/norrig\/CVE-2021-41773-exploiter",
"description": "School project - Please use other repos for actual testing",
"fork": false,
"created_at": "2022-01-12T17:42:36Z",
"updated_at": "2022-01-12T18:26:57Z",
"pushed_at": "2022-01-13T16:18:33Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0
},
{
"id": 452242021,
"name": "CVE-2021-41773-exercise",
"full_name": "m96dg\/CVE-2021-41773-exercise",
"owner": {
"login": "m96dg",
"id": 65173648,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/65173648?v=4",
"html_url": "https:\/\/github.com\/m96dg"
},
"html_url": "https:\/\/github.com\/m96dg\/CVE-2021-41773-exercise",
"description": "A flaw was found in a change made to path normalization in Apache HTTP Server 2.4.49. An attacker could use a path traversal attack to map URLs to files outside the directories configured by Alias-like directives. If files outside of these directories are not protected by the usual default configuration \"require all denied\", these requests can succeed. If CGI scripts are also enabled for these aliased pathes, this could allow for remote code execution. This issue only affects Apache 2.4.49 and not earlier versions. Credits to: https:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2021-41773 ",
"fork": false,
"created_at": "2022-01-26T11:02:46Z",
"updated_at": "2022-01-26T11:22:13Z",
"pushed_at": "2022-01-30T19:02:43Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0
},
{
"id": 464271089,
"name": "CVE-2021-41773",
"full_name": "skentagon\/CVE-2021-41773",
"owner": {
"login": "skentagon",
"id": 49702576,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/49702576?v=4",
"html_url": "https:\/\/github.com\/skentagon"
},
"html_url": "https:\/\/github.com\/skentagon\/CVE-2021-41773",
"description": null,
"fork": false,
"created_at": "2022-02-27T22:39:58Z",
"updated_at": "2022-03-04T00:11:58Z",
"pushed_at": "2022-03-04T00:05:44Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0
},
{
"id": 467687901,
"name": "CVE-2021-41773",
"full_name": "mauricelambert\/CVE-2021-41773",
"owner": {
"login": "mauricelambert",
"id": 50479118,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/50479118?v=4",
"html_url": "https:\/\/github.com\/mauricelambert"
},
"html_url": "https:\/\/github.com\/mauricelambert\/CVE-2021-41773",
"description": "These Metasploit, Nmap, Python and Ruby scripts detects and exploits CVE-2021-41773 with RCE and local file disclosure.",
"fork": false,
"created_at": "2022-03-08T21:55:53Z",
"updated_at": "2022-03-23T16:56:34Z",
"pushed_at": "2022-03-14T07:34:49Z",
"stargazers_count": 1,
"watchers_count": 1,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"topics": [
"cve",
"cve-2021-41773",
"detection",
"exploit",
"metasploit",
"nmap",
"python3",
"rce",
"ruby",
"scanner",
"vulnerability"
],
"visibility": "public",
"forks": 0,
"watchers": 1,
"score": 0
},
{
"id": 468909402,
"name": "CVE-2021-41773",
"full_name": "the29a\/CVE-2021-41773",
"owner": {
"login": "the29a",
"id": 4436697,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/4436697?v=4",
"html_url": "https:\/\/github.com\/the29a"
},
"html_url": "https:\/\/github.com\/the29a\/CVE-2021-41773",
"description": "Small PoC of CVE-2021-41773",
"fork": false,
"created_at": "2022-03-11T21:50:35Z",
"updated_at": "2022-03-11T21:52:35Z",
"pushed_at": "2022-03-11T22:10:25Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0
},
{
"id": 469203660,
"name": "CVE-2021-41773",
"full_name": "thehackersbrain\/CVE-2021-41773",
"owner": {
"login": "thehackersbrain",
"id": 36809025,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/36809025?v=4",
"html_url": "https:\/\/github.com\/thehackersbrain"
},
"html_url": "https:\/\/github.com\/thehackersbrain\/CVE-2021-41773",
"description": "Apache2 2.4.49 - LFI & RCE Exploit - CVE-2021-41773",
"fork": false,
"created_at": "2022-03-12T21:24:55Z",
"updated_at": "2022-03-24T13:32:22Z",
"pushed_at": "2022-03-12T21:30:58Z",
"stargazers_count": 50,
"watchers_count": 50,
"forks_count": 15,
"allow_forking": true,
"is_template": false,
"topics": [
"apache2",
"cve-2021-41773",
"exploit",
"gauravraj",
"lfi",
"python",
"rce",
"thehackersbrain"
],
"visibility": "public",
"forks": 15,
"watchers": 50,
"score": 0
},
{
"id": 469576020,
"name": "CVE-2021-41773",
"full_name": "cryst4lliz3\/CVE-2021-41773",
"owner": {
"login": "cryst4lliz3",
"id": 101309325,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/101309325?v=4",
"html_url": "https:\/\/github.com\/cryst4lliz3"
},
"html_url": "https:\/\/github.com\/cryst4lliz3\/CVE-2021-41773",
"description": null,
"fork": false,
"created_at": "2022-03-14T04:08:56Z",
"updated_at": "2022-03-14T04:09:11Z",
"pushed_at": "2022-03-14T04:09:05Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0
},
{
"id": 469821841,
"name": "CVE-2021-41773",
"full_name": "Fa1c0n35\/CVE-2021-41773",
"owner": {
"login": "Fa1c0n35",
"id": 33335488,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/33335488?v=4",
"html_url": "https:\/\/github.com\/Fa1c0n35"
},
"html_url": "https:\/\/github.com\/Fa1c0n35\/CVE-2021-41773",
"description": null,
"fork": false,
"created_at": "2022-03-14T16:43:49Z",
"updated_at": "2022-03-14T16:44:00Z",
"pushed_at": "2022-03-14T16:43:57Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0
}
]