{"id":7492,"date":"2021-10-08T19:22:42","date_gmt":"2021-10-09T02:22:42","guid":{"rendered":"https:\/\/webdev.securin.xyz\/?p=7492"},"modified":"2023-04-05T12:37:43","modified_gmt":"2023-04-05T19:37:43","slug":"cve-2021-41773-cve-2021-42013-apache-web-servers-are-vulnerable-patch-now","status":"publish","type":"post","link":"https:\/\/webdev.securin.xyz\/articles\/cve-2021-41773-cve-2021-42013-apache-web-servers-are-vulnerable-patch-now\/","title":{"rendered":"CVE-2021-41773 & CVE-2021-42013: Apache Web Servers are Vulnerable, Patch Now!"},"content":{"rendered":"
On October 4, 2021, Apache announced<\/a> fixes for a couple of vulnerabilities, including a zero-day flaw that affects Apache HTTP Server version 2.4.49\u2014a widely used open-source, cross-platform web server for Unix and Windows. This actively exploited zero-day vulnerability is called CVE-2021-41773<\/a>, a Remote Code Execution bug that allows threat actors to map URLs to files outside the expected document root by launching a path traversal and file disclosure attack.<\/p>\n <\/p>\n A day later, Apache discovered that their earlier patch for the actively exploited CVE-2021-41773 vulnerability was insufficient and published an upgraded version of 2.4.51. This new path traversal vector is being tracked as CVE-2021-42013<\/a>. CISA has also issued<\/a> an alert for these vulnerabilities, which are likely to be exploited in ongoing attacks. Taking the CISA alert into account, we highly recommend users to patch immediately.<\/p>\n <\/p>\n Recently, a security researcher posted a PoC exploit in public, quoting that this flaw could be used to execute remote code only when mod_cgi is enabled. Once enabled, an attacker can execute arbitrary programs via HTTP POST requests. A single, seemingly harmless HTTP request targeted at your server might be enough for an attacker to totally seize control of it.<\/p>\n <\/p>\n Moreover, this vulnerability is already well known and easy to exploit, with Proof-of-Concept code circulating extensively on Twitter, making it extremely critical to patch immediately.<\/p>\n <\/p>\n <\/p>\n On October 5, 2021, just a day after the inadequate fix was released, a security analyst developed an Nmap script<\/a> to detect this path transversal vulnerability.<\/p>\n <\/p>\n <\/p>\n Nmap Script<\/strong><\/em><\/p>\n <\/p>\n <\/p>\n Additionally, exploits of this issue may also result in the source leakage of interpreted files, such as CGI scripts. For successful exploitation, the target must be running Apache HTTP Server version 2.4.49 or 2.4.50, and the “Requires All Denied” access control setting must be disabled. However, this appears to be the default configuration. After the disclosure of the PoC, hackers have been able to reproduce the exploit code of the vulnerability.<\/p>\n <\/p>\n <\/p>\n Researchers at Cyber Security Works (CSW) analyzed both the high-impact vulnerabilities from a pentester\u2019s perspective. Here is our analysis:<\/p>\n <\/p>\n Successful exploitation could allow unauthorized users to mislead the web server into returning files, which these users should not have been able to access, and lead to further cyberattacks or data breaches.<\/p>\n<\/li>\n The vulnerabilities only affect Apache HTTP Server versions 2.4.49 and 2.4.50; those with a different access configuration are not vulnerable to the flaws.<\/p>\n<\/li>\n The CVEs have not yet been assigned CVSS scores.<\/p>\n<\/li>\n CISA issued an alert to patch<\/a> these vulnerabilities immediately.<\/p>\n<\/li>\n Multiple known exploit codes have been released in the wild. However, the vendor has stated in its advisory<\/a> that CVE-2021-41773 is \u201cknown to be exploited in the wild.\u201d<\/p>\n<\/li>\n CVE-2021-41773<\/a> and CVE-2021-42013 have both been categorized under CWE-22 (Improper Limitation of a Pathname to a Restricted Directory (‘Path Traversal’)), which falls under the 2021 CWE Top 10 Most Dangerous Software Weaknesses<\/a>.<\/p>\n<\/li>\nProof-of-Concept: Exacerbating the Issue<\/h2>\n
Possible Data Leakage<\/h2>\n
About these Vulnerabilities<\/h2>\n
\n