Known Exploited Vulnerability
7.5
HIGH CVSS 3.1
CVE-2021-41773
Apache HTTP Server Path Traversal Vulnerability - [Actively Exploited]
Description

A flaw was found in a change made to path normalization in Apache HTTP Server 2.4.49. An attacker could use a path traversal attack to map URLs to files outside the directories configured by Alias-like directives. If files outside of these directories are not protected by the usual default configuration "require all denied", these requests can succeed. If CGI scripts are also enabled for these aliased pathes, this could allow for remote code execution. This issue is known to be exploited in the wild. This issue only affects Apache 2.4.49 and not earlier versions. The fix in Apache HTTP Server 2.4.50 was found to be incomplete, see CVE-2021-42013.

INFO

Published Date :

Oct. 5, 2021, 9:15 a.m.

Last Modified :

March 21, 2025, 9:07 p.m.

Remotely Exploit :

Yes !
CISA Notification
CISA KEV (Known Exploited Vulnerabilities)

For the benefit of the cybersecurity community and network defenders—and to help every organization better manage vulnerabilities and keep pace with threat activity—CISA maintains the authoritative source of vulnerabilities that have been exploited in the wild.

Description :

Apache HTTP Server contains a path traversal vulnerability that allows an attacker to perform remote code execution if files outside directories configured by Alias-like directives are not under default �require all denied� or if CGI scripts are enabled. The original patch issued under this CVE ID is insufficient, please review remediation information under CVE-2021-42013.

Required Action :

Apply updates per vendor instructions.

Notes :

https://nvd.nist.gov/vuln/detail/CVE-2021-41773

Affected Products

The following products are affected by CVE-2021-41773 vulnerability. Even if cvefeed.io is aware of the exact versions of the products that are affected, the information is not represented in the table below.

ID Vendor Product Action
1 Fedoraproject fedora
1 Netapp cloud_backup
1 Apache http_server
1 Oracle instantis_enterprisetrack
CVSS Scores
The Common Vulnerability Scoring System is a standardized framework for assessing the severity of vulnerabilities in software and systems. We collect and displays CVSS scores from various sources for each CVE.
Score Version Severity Vector Exploitability Score Impact Score Source
CVSS 2.0 MEDIUM [email protected]
CVSS 3.1 HIGH [email protected]
CVSS 3.1 HIGH 134c704f-9b21-4f2e-91b3-4a467353bcc0
Solution
A path traversal vulnerability exists; update Apache HTTP Server to a patched version.
  • Upgrade Apache HTTP Server to version 2.4.50 or later.
  • Update the affected packages on the system.
Public PoC/Exploit Available at Github

CVE-2021-41773 has a 447 public PoC/Exploit available at Github. Go to the Public Exploits tab to see the list.

References to Advisories, Solutions, and Tools

Here, you will find a curated list of external links that provide in-depth information, practical solutions, and valuable tools related to CVE-2021-41773.

URL Resource
http://packetstormsecurity.com/files/164418/Apache-HTTP-Server-2.4.49-Path-Traversal-Remote-Code-Execution.html Exploit Third Party Advisory VDB Entry
http://packetstormsecurity.com/files/164418/Apache-HTTP-Server-2.4.49-Path-Traversal.html Exploit Third Party Advisory VDB Entry
http://packetstormsecurity.com/files/164629/Apache-2.4.49-2.4.50-Traversal-Remote-Code-Execution.html Exploit Third Party Advisory VDB Entry
http://packetstormsecurity.com/files/164941/Apache-HTTP-Server-2.4.50-Remote-Code-Execution.html Exploit Third Party Advisory VDB Entry
http://www.openwall.com/lists/oss-security/2021/10/05/2 Mailing List Third Party Advisory
http://www.openwall.com/lists/oss-security/2021/10/07/1 Mailing List Third Party Advisory
http://www.openwall.com/lists/oss-security/2021/10/07/6 Mailing List Third Party Advisory
http://www.openwall.com/lists/oss-security/2021/10/08/1 Exploit Mailing List Third Party Advisory
http://www.openwall.com/lists/oss-security/2021/10/08/2 Mailing List Third Party Advisory
http://www.openwall.com/lists/oss-security/2021/10/08/3 Exploit Mailing List Third Party Advisory
http://www.openwall.com/lists/oss-security/2021/10/08/4 Mailing List Third Party Advisory
http://www.openwall.com/lists/oss-security/2021/10/08/5 Mailing List Third Party Advisory
http://www.openwall.com/lists/oss-security/2021/10/08/6 Mailing List Third Party Advisory
http://www.openwall.com/lists/oss-security/2021/10/09/1 Mailing List Third Party Advisory
http://www.openwall.com/lists/oss-security/2021/10/11/4 Mailing List Patch Third Party Advisory
http://www.openwall.com/lists/oss-security/2021/10/15/3 Mailing List Patch Third Party Advisory
http://www.openwall.com/lists/oss-security/2021/10/16/1 Mailing List Third Party Advisory
https://httpd.apache.org/security/vulnerabilities_24.html Release Notes Vendor Advisory
https://lists.apache.org/thread.html/r17a4c6ce9aff662efd9459e9d1850ab4a611cb23392fc68264c72cb3%40%3Ccvs.httpd.apache.org%3E Mailing List Patch
https://lists.apache.org/thread.html/r6abf5f2ba6f1aa8b1030f95367aaf17660c4e4c78cb2338aee18982f%40%3Cusers.httpd.apache.org%3E Mailing List
https://lists.apache.org/thread.html/r7c795cd45a3384d4d27e57618a215b0ed19cb6ca8eb070061ad5d837%40%3Cannounce.apache.org%3E Mailing List
https://lists.apache.org/thread.html/r98d704ed4377ed889d40479db79ed1ee2f43b2ebdd79ce84b042df45%40%3Cannounce.apache.org%3E Mailing List
https://lists.apache.org/thread.html/rb5b0e46f179f60b0c70204656bc52fcb558e961cb4d06a971e9e3efb%40%3Cusers.httpd.apache.org%3E Mailing List
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/RMIIEFINL6FUIOPD2A3M5XC6DH45Y3CC/ Release Notes
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/WS5RVHOIIRECG65ZBTZY7IEJVWQSQPG3/ Release Notes
https://security.gentoo.org/glsa/202208-20 Third Party Advisory
https://security.netapp.com/advisory/ntap-20211029-0009/ Third Party Advisory
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-apache-httpd-pathtrv-LAzg68cZ Third Party Advisory
https://www.oracle.com/security-alerts/cpujan2022.html Patch Third Party Advisory
http://packetstormsecurity.com/files/164418/Apache-HTTP-Server-2.4.49-Path-Traversal-Remote-Code-Execution.html Exploit Third Party Advisory VDB Entry
http://packetstormsecurity.com/files/164418/Apache-HTTP-Server-2.4.49-Path-Traversal.html Exploit Third Party Advisory VDB Entry
http://packetstormsecurity.com/files/164629/Apache-2.4.49-2.4.50-Traversal-Remote-Code-Execution.html Exploit Third Party Advisory VDB Entry
http://packetstormsecurity.com/files/164941/Apache-HTTP-Server-2.4.50-Remote-Code-Execution.html Exploit Third Party Advisory VDB Entry
http://www.openwall.com/lists/oss-security/2021/10/05/2 Mailing List Third Party Advisory
http://www.openwall.com/lists/oss-security/2021/10/07/1 Mailing List Third Party Advisory
http://www.openwall.com/lists/oss-security/2021/10/07/6 Mailing List Third Party Advisory
http://www.openwall.com/lists/oss-security/2021/10/08/1 Exploit Mailing List Third Party Advisory
http://www.openwall.com/lists/oss-security/2021/10/08/2 Mailing List Third Party Advisory
http://www.openwall.com/lists/oss-security/2021/10/08/3 Exploit Mailing List Third Party Advisory
http://www.openwall.com/lists/oss-security/2021/10/08/4 Mailing List Third Party Advisory
http://www.openwall.com/lists/oss-security/2021/10/08/5 Mailing List Third Party Advisory
http://www.openwall.com/lists/oss-security/2021/10/08/6 Mailing List Third Party Advisory
http://www.openwall.com/lists/oss-security/2021/10/09/1 Mailing List Third Party Advisory
http://www.openwall.com/lists/oss-security/2021/10/11/4 Mailing List Patch Third Party Advisory
http://www.openwall.com/lists/oss-security/2021/10/15/3 Mailing List Patch Third Party Advisory
http://www.openwall.com/lists/oss-security/2021/10/16/1 Mailing List Third Party Advisory
https://httpd.apache.org/security/vulnerabilities_24.html Release Notes Vendor Advisory
https://lists.apache.org/thread.html/r17a4c6ce9aff662efd9459e9d1850ab4a611cb23392fc68264c72cb3%40%3Ccvs.httpd.apache.org%3E Mailing List Patch
https://lists.apache.org/thread.html/r6abf5f2ba6f1aa8b1030f95367aaf17660c4e4c78cb2338aee18982f%40%3Cusers.httpd.apache.org%3E Mailing List
https://lists.apache.org/thread.html/r7c795cd45a3384d4d27e57618a215b0ed19cb6ca8eb070061ad5d837%40%3Cannounce.apache.org%3E Mailing List
https://lists.apache.org/thread.html/r98d704ed4377ed889d40479db79ed1ee2f43b2ebdd79ce84b042df45%40%3Cannounce.apache.org%3E Mailing List
https://lists.apache.org/thread.html/rb5b0e46f179f60b0c70204656bc52fcb558e961cb4d06a971e9e3efb%40%3Cusers.httpd.apache.org%3E Mailing List
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/RMIIEFINL6FUIOPD2A3M5XC6DH45Y3CC/ Release Notes
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/WS5RVHOIIRECG65ZBTZY7IEJVWQSQPG3/ Release Notes
https://security.gentoo.org/glsa/202208-20 Third Party Advisory
https://security.netapp.com/advisory/ntap-20211029-0009/ Third Party Advisory
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-apache-httpd-pathtrv-LAzg68cZ Third Party Advisory
https://www.oracle.com/security-alerts/cpujan2022.html Patch Third Party Advisory
CWE - Common Weakness Enumeration

While CVE identifies specific instances of vulnerabilities, CWE categorizes the common flaws or weaknesses that can lead to vulnerabilities. CVE-2021-41773 is associated with the following CWEs:

We scan GitHub repositories to detect new proof-of-concept exploits. Following list is a collection of public exploits and proof-of-concepts, which have been published on GitHub (sorted by the most recently updated).

GoHunt: A fast, all-in-one recon and vulnerability scanner for ethical hacking.

Go

Updated: 1 day, 20 hours ago
0 stars 0 fork 0 watcher
Born at : Aug. 22, 2025, 12:22 a.m. This repo has been linked 1 different CVEs too.

The CHASE-LB (Container-based Host-Level Anomaly Detection System Call Traces - Linux-Based) dataset is a realistic and contemporary resource designed to address the critical need for relevant data in the field of container security

Updated: 2 days, 10 hours ago
0 stars 0 fork 0 watcher
Born at : Aug. 21, 2025, 8:27 p.m. This repo has been linked 9 different CVEs too.

TryHackMe Modules

Updated: 2 days, 17 hours ago
0 stars 0 fork 0 watcher
Born at : Aug. 21, 2025, 3 p.m. This repo has been linked 5 different CVEs too.

A universal parser and normalizer for security scanner reports (GVM, Nessus, Nikto, ZAP, Burp, Nmap) into a unified MongoDB schema.

Python

Updated: 3 days, 23 hours ago
0 stars 0 fork 0 watcher
Born at : Aug. 20, 2025, 8:03 a.m. This repo has been linked 2 different CVEs too.

None

Lua

Updated: 23 hours, 12 minutes ago
1 stars 0 fork 0 watcher
Born at : Aug. 19, 2025, 3:07 p.m. This repo has been linked 1 different CVEs too.

Here’s how you can manually test suspicious findings step by step:

Shell

Updated: 5 days, 17 hours ago
0 stars 0 fork 0 watcher
Born at : Aug. 18, 2025, 1:42 p.m. This repo has been linked 1 different CVEs too.

None

Updated: 1 week ago
0 stars 0 fork 0 watcher
Born at : Aug. 17, 2025, 3:20 a.m. This repo has been linked 1 different CVEs too.

This is a very common step in penetration testing / bug bounty reconnaissance. Let’s break it down step by step with details, tools, and methodology.

Shell

Updated: 1 week ago
0 stars 0 fork 0 watcher
Born at : Aug. 16, 2025, 6:39 p.m. This repo has been linked 1 different CVEs too.

None

Updated: 1 week, 1 day ago
0 stars 0 fork 0 watcher
Born at : Aug. 15, 2025, 12:35 p.m. This repo has been linked 10 different CVEs too.

None

Updated: 1 week, 1 day ago
0 stars 0 fork 0 watcher
Born at : Aug. 15, 2025, 12:09 p.m. This repo has been linked 4 different CVEs too.

Python tool to scan ports, detect service versions, flag vulnerabilities, and generate clean security reports.

Python

Updated: 1 week, 1 day ago
0 stars 0 fork 0 watcher
Born at : Aug. 15, 2025, 10:12 a.m. This repo has been linked 1 different CVEs too.

None

Updated: 1 week, 1 day ago
0 stars 0 fork 0 watcher
Born at : Aug. 15, 2025, 9:07 a.m. This repo has been linked 310 different CVEs too.

Bash POC script for RCE vulnerability in Apache 2.4.49

Shell

Updated: 1 week, 5 days ago
0 stars 0 fork 0 watcher
Born at : Aug. 11, 2025, 12:59 p.m. This repo has been linked 1 different CVEs too.

Exposed an Ubuntu VM in an isolated Azure environment to capture real-world attacks. Streamed logs to Azure Sentinel, analyzed data with KQL, and visualized global attacker origins using Azure Workbooks. Revealed persistent botnet activity and exploitation attempts on critical Linux vulnerabilities.

Updated: 1 week, 6 days ago
0 stars 0 fork 0 watcher
Born at : Aug. 11, 2025, 6:41 a.m. This repo has been linked 2 different CVEs too.

None

Updated: 3 weeks, 2 days ago
0 stars 0 fork 0 watcher
Born at : July 31, 2025, 5:02 p.m. This repo has been linked 1 different CVEs too.

Results are limited to the first 15 repositories due to potential performance issues.

The following list is the news that have been mention CVE-2021-41773 vulnerability anywhere in the article.

  • Hackread - Latest Cybersecurity, Hacking News, Tech, AI & Crypto
Years Long Linux Cryptominer Spotted Using Legit Sites to Spread Malware

A recent investigation by VulnCheck has exposed a cryptomining campaign that has been running unnoticed for years. The threat actor behind this operation, using the Linuxsys miner, has been targeting ... Read more

Published Date: Jul 18, 2025 (1 month ago)
  • The Hacker News
Hackers Exploit Apache HTTP Server Flaw to Deploy Linuxsys Cryptocurrency Miner

Jul 17, 2025Ravie LakshmananCryptocurrency / Vulnerability Cybersecurity researchers have discovered a new campaign that exploits a known security flaw impacting Apache HTTP Server to deliver a cryp ... Read more

Published Date: Jul 17, 2025 (1 month ago)
  • Cybersecurity News
Mozi Botnet Re-Emerges as Androxgh0st in New Wave of IoT Exploits

The notorious Mozi botnet, once believed to be largely defunct following law enforcement actions, has resurfaced in a powerful new avatar: Androxgh0st. CloudSEK’s recent report reveals that Androxgh0s ... Read more

Published Date: Nov 12, 2024 (9 months, 1 week ago)
  • The Hacker News
AndroxGh0st Malware Integrates Mozi Botnet to Target IoT and Cloud Services

IoT Security / Vulnerability The threat actors behind the AndroxGh0st malware are now exploiting a broader set of security flaws impacting various internet-facing applications, while also deploying th ... Read more

Published Date: Nov 08, 2024 (9 months, 2 weeks ago)
  • Hackread - Latest Cybersecurity, Tech, Crypto & Hacking News
Androxgh0st Botnet Integrates Mozi, Expands Attacks on IoT Vulnerabilities

CloudSEK reports that the Androxgh0st botnet has integrated with the Mozi botnet and exploits a wide range of vulnerabilities in web applications and IoT devices. Learn about the specific vulnerabilit ... Read more

Published Date: Nov 07, 2024 (9 months, 2 weeks ago)

The following table lists the changes that have been made to the CVE-2021-41773 vulnerability over time.

Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability's severity, exploitability, or other characteristics.

  • Modified Analysis by [email protected]

    Mar. 21, 2025

    Action Type Old Value New Value
  • CVE Modified by 134c704f-9b21-4f2e-91b3-4a467353bcc0

    Feb. 04, 2025

    Action Type Old Value New Value
    Added CVSS V3.1 AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
  • CVE Modified by af854a3a-2127-422b-91ae-364da2661108

    Nov. 21, 2024

    Action Type Old Value New Value
    Added Reference http://packetstormsecurity.com/files/164418/Apache-HTTP-Server-2.4.49-Path-Traversal.html
    Added Reference http://packetstormsecurity.com/files/164418/Apache-HTTP-Server-2.4.49-Path-Traversal-Remote-Code-Execution.html
    Added Reference http://packetstormsecurity.com/files/164629/Apache-2.4.49-2.4.50-Traversal-Remote-Code-Execution.html
    Added Reference http://packetstormsecurity.com/files/164941/Apache-HTTP-Server-2.4.50-Remote-Code-Execution.html
    Added Reference http://www.openwall.com/lists/oss-security/2021/10/05/2
    Added Reference http://www.openwall.com/lists/oss-security/2021/10/07/1
    Added Reference http://www.openwall.com/lists/oss-security/2021/10/07/6
    Added Reference http://www.openwall.com/lists/oss-security/2021/10/08/1
    Added Reference http://www.openwall.com/lists/oss-security/2021/10/08/2
    Added Reference http://www.openwall.com/lists/oss-security/2021/10/08/3
    Added Reference http://www.openwall.com/lists/oss-security/2021/10/08/4
    Added Reference http://www.openwall.com/lists/oss-security/2021/10/08/5
    Added Reference http://www.openwall.com/lists/oss-security/2021/10/08/6
    Added Reference http://www.openwall.com/lists/oss-security/2021/10/09/1
    Added Reference http://www.openwall.com/lists/oss-security/2021/10/11/4
    Added Reference http://www.openwall.com/lists/oss-security/2021/10/15/3
    Added Reference http://www.openwall.com/lists/oss-security/2021/10/16/1
    Added Reference https://httpd.apache.org/security/vulnerabilities_24.html
    Added Reference https://lists.apache.org/thread.html/r17a4c6ce9aff662efd9459e9d1850ab4a611cb23392fc68264c72cb3%40%3Ccvs.httpd.apache.org%3E
    Added Reference https://lists.apache.org/thread.html/r6abf5f2ba6f1aa8b1030f95367aaf17660c4e4c78cb2338aee18982f%40%3Cusers.httpd.apache.org%3E
    Added Reference https://lists.apache.org/thread.html/r7c795cd45a3384d4d27e57618a215b0ed19cb6ca8eb070061ad5d837%40%3Cannounce.apache.org%3E
    Added Reference https://lists.apache.org/thread.html/r98d704ed4377ed889d40479db79ed1ee2f43b2ebdd79ce84b042df45%40%3Cannounce.apache.org%3E
    Added Reference https://lists.apache.org/thread.html/rb5b0e46f179f60b0c70204656bc52fcb558e961cb4d06a971e9e3efb%40%3Cusers.httpd.apache.org%3E
    Added Reference https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/RMIIEFINL6FUIOPD2A3M5XC6DH45Y3CC/
    Added Reference https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/WS5RVHOIIRECG65ZBTZY7IEJVWQSQPG3/
    Added Reference https://security.gentoo.org/glsa/202208-20
    Added Reference https://security.netapp.com/advisory/ntap-20211029-0009/
    Added Reference https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-apache-httpd-pathtrv-LAzg68cZ
    Added Reference https://www.oracle.com/security-alerts/cpujan2022.html
  • Modified Analysis by [email protected]

    Jul. 26, 2024

    Action Type Old Value New Value
    Changed Reference Type https://httpd.apache.org/security/vulnerabilities_24.html Vendor Advisory https://httpd.apache.org/security/vulnerabilities_24.html Release Notes, Vendor Advisory
    Changed Reference Type https://lists.apache.org/thread.html/r17a4c6ce9aff662efd9459e9d1850ab4a611cb23392fc68264c72cb3%40%3Ccvs.httpd.apache.org%3E No Types Assigned https://lists.apache.org/thread.html/r17a4c6ce9aff662efd9459e9d1850ab4a611cb23392fc68264c72cb3%40%3Ccvs.httpd.apache.org%3E Mailing List, Patch
    Changed Reference Type https://lists.apache.org/thread.html/r6abf5f2ba6f1aa8b1030f95367aaf17660c4e4c78cb2338aee18982f%40%3Cusers.httpd.apache.org%3E No Types Assigned https://lists.apache.org/thread.html/r6abf5f2ba6f1aa8b1030f95367aaf17660c4e4c78cb2338aee18982f%40%3Cusers.httpd.apache.org%3E Mailing List
    Changed Reference Type https://lists.apache.org/thread.html/r7c795cd45a3384d4d27e57618a215b0ed19cb6ca8eb070061ad5d837%40%3Cannounce.apache.org%3E No Types Assigned https://lists.apache.org/thread.html/r7c795cd45a3384d4d27e57618a215b0ed19cb6ca8eb070061ad5d837%40%3Cannounce.apache.org%3E Mailing List
    Changed Reference Type https://lists.apache.org/thread.html/r98d704ed4377ed889d40479db79ed1ee2f43b2ebdd79ce84b042df45%40%3Cannounce.apache.org%3E No Types Assigned https://lists.apache.org/thread.html/r98d704ed4377ed889d40479db79ed1ee2f43b2ebdd79ce84b042df45%40%3Cannounce.apache.org%3E Mailing List
    Changed Reference Type https://lists.apache.org/thread.html/rb5b0e46f179f60b0c70204656bc52fcb558e961cb4d06a971e9e3efb%40%3Cusers.httpd.apache.org%3E No Types Assigned https://lists.apache.org/thread.html/rb5b0e46f179f60b0c70204656bc52fcb558e961cb4d06a971e9e3efb%40%3Cusers.httpd.apache.org%3E Mailing List
    Changed Reference Type https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/RMIIEFINL6FUIOPD2A3M5XC6DH45Y3CC/ No Types Assigned https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/RMIIEFINL6FUIOPD2A3M5XC6DH45Y3CC/ Release Notes
    Changed Reference Type https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/WS5RVHOIIRECG65ZBTZY7IEJVWQSQPG3/ No Types Assigned https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/WS5RVHOIIRECG65ZBTZY7IEJVWQSQPG3/ Release Notes
  • CVE Modified by [email protected]

    May. 14, 2024

    Action Type Old Value New Value
  • CVE Modified by [email protected]

    Nov. 07, 2023

    Action Type Old Value New Value
    Added Reference Apache Software Foundation https://lists.apache.org/thread.html/r6abf5f2ba6f1aa8b1030f95367aaf17660c4e4c78cb2338aee18982f%40%3Cusers.httpd.apache.org%3E [No types assigned]
    Added Reference Apache Software Foundation https://lists.apache.org/thread.html/r98d704ed4377ed889d40479db79ed1ee2f43b2ebdd79ce84b042df45%40%3Cannounce.apache.org%3E [No types assigned]
    Added Reference Apache Software Foundation https://lists.apache.org/thread.html/r7c795cd45a3384d4d27e57618a215b0ed19cb6ca8eb070061ad5d837%40%3Cannounce.apache.org%3E [No types assigned]
    Added Reference Apache Software Foundation https://lists.apache.org/thread.html/rb5b0e46f179f60b0c70204656bc52fcb558e961cb4d06a971e9e3efb%40%3Cusers.httpd.apache.org%3E [No types assigned]
    Added Reference Apache Software Foundation https://lists.apache.org/thread.html/r17a4c6ce9aff662efd9459e9d1850ab4a611cb23392fc68264c72cb3%40%3Ccvs.httpd.apache.org%3E [No types assigned]
    Added Reference Apache Software Foundation https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/RMIIEFINL6FUIOPD2A3M5XC6DH45Y3CC/ [No types assigned]
    Added Reference Apache Software Foundation https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/WS5RVHOIIRECG65ZBTZY7IEJVWQSQPG3/ [No types assigned]
    Removed Reference Apache Software Foundation https://lists.apache.org/thread.html/r6abf5f2ba6f1aa8b1030f95367aaf17660c4e4c78cb2338aee18982f@%3Cusers.httpd.apache.org%3E
    Removed Reference Apache Software Foundation https://lists.apache.org/thread.html/r98d704ed4377ed889d40479db79ed1ee2f43b2ebdd79ce84b042df45@%3Cannounce.apache.org%3E
    Removed Reference Apache Software Foundation https://lists.apache.org/thread.html/r7c795cd45a3384d4d27e57618a215b0ed19cb6ca8eb070061ad5d837@%3Cannounce.apache.org%3E
    Removed Reference Apache Software Foundation https://lists.apache.org/thread.html/rb5b0e46f179f60b0c70204656bc52fcb558e961cb4d06a971e9e3efb@%3Cusers.httpd.apache.org%3E
    Removed Reference Apache Software Foundation https://lists.apache.org/thread.html/r17a4c6ce9aff662efd9459e9d1850ab4a611cb23392fc68264c72cb3@%3Ccvs.httpd.apache.org%3E
    Removed Reference Apache Software Foundation https://lists.fedoraproject.org/archives/list/[email protected]/message/RMIIEFINL6FUIOPD2A3M5XC6DH45Y3CC/
    Removed Reference Apache Software Foundation https://lists.fedoraproject.org/archives/list/[email protected]/message/WS5RVHOIIRECG65ZBTZY7IEJVWQSQPG3/
  • Modified Analysis by [email protected]

    Oct. 28, 2022

    Action Type Old Value New Value
    Changed Reference Type https://security.gentoo.org/glsa/202208-20 No Types Assigned https://security.gentoo.org/glsa/202208-20 Third Party Advisory
  • CVE Modified by [email protected]

    Aug. 15, 2022

    Action Type Old Value New Value
    Added Reference https://security.gentoo.org/glsa/202208-20 [No Types Assigned]
  • Modified Analysis by [email protected]

    Mar. 25, 2022

    Action Type Old Value New Value
    Changed Reference Type https://www.oracle.com/security-alerts/cpujan2022.html No Types Assigned https://www.oracle.com/security-alerts/cpujan2022.html Patch, Third Party Advisory
    Added CPE Configuration OR *cpe:2.3:a:oracle:instantis_enterprisetrack:17.1:*:*:*:*:*:*:* *cpe:2.3:a:oracle:instantis_enterprisetrack:17.2:*:*:*:*:*:*:* *cpe:2.3:a:oracle:instantis_enterprisetrack:17.3:*:*:*:*:*:*:*
    Added CPE Configuration OR *cpe:2.3:a:netapp:cloud_backup:-:*:*:*:*:*:*:*
  • CVE Modified by [email protected]

    Feb. 07, 2022

    Action Type Old Value New Value
    Added Reference https://www.oracle.com/security-alerts/cpujan2022.html [No Types Assigned]
  • Modified Analysis by [email protected]

    Nov. 30, 2021

    Action Type Old Value New Value
    Changed Reference Type http://packetstormsecurity.com/files/164418/Apache-HTTP-Server-2.4.49-Path-Traversal-Remote-Code-Execution.html Exploit, Third Party Advisory http://packetstormsecurity.com/files/164418/Apache-HTTP-Server-2.4.49-Path-Traversal-Remote-Code-Execution.html Exploit, Third Party Advisory, VDB Entry
    Changed Reference Type http://packetstormsecurity.com/files/164629/Apache-2.4.49-2.4.50-Traversal-Remote-Code-Execution.html No Types Assigned http://packetstormsecurity.com/files/164629/Apache-2.4.49-2.4.50-Traversal-Remote-Code-Execution.html Exploit, Third Party Advisory, VDB Entry
    Changed Reference Type http://packetstormsecurity.com/files/164941/Apache-HTTP-Server-2.4.50-Remote-Code-Execution.html No Types Assigned http://packetstormsecurity.com/files/164941/Apache-HTTP-Server-2.4.50-Remote-Code-Execution.html Exploit, Third Party Advisory, VDB Entry
    Changed Reference Type http://www.openwall.com/lists/oss-security/2021/10/07/1 Third Party Advisory http://www.openwall.com/lists/oss-security/2021/10/07/1 Mailing List, Third Party Advisory
    Changed Reference Type http://www.openwall.com/lists/oss-security/2021/10/07/6 Third Party Advisory http://www.openwall.com/lists/oss-security/2021/10/07/6 Mailing List, Third Party Advisory
    Changed Reference Type http://www.openwall.com/lists/oss-security/2021/10/08/1 Third Party Advisory http://www.openwall.com/lists/oss-security/2021/10/08/1 Exploit, Mailing List, Third Party Advisory
    Changed Reference Type http://www.openwall.com/lists/oss-security/2021/10/08/2 Third Party Advisory http://www.openwall.com/lists/oss-security/2021/10/08/2 Mailing List, Third Party Advisory
    Changed Reference Type http://www.openwall.com/lists/oss-security/2021/10/08/3 Third Party Advisory http://www.openwall.com/lists/oss-security/2021/10/08/3 Exploit, Mailing List, Third Party Advisory
    Changed Reference Type http://www.openwall.com/lists/oss-security/2021/10/08/4 Third Party Advisory http://www.openwall.com/lists/oss-security/2021/10/08/4 Mailing List, Third Party Advisory
    Changed Reference Type http://www.openwall.com/lists/oss-security/2021/10/08/5 Third Party Advisory http://www.openwall.com/lists/oss-security/2021/10/08/5 Mailing List, Third Party Advisory
    Changed Reference Type http://www.openwall.com/lists/oss-security/2021/10/08/6 Third Party Advisory http://www.openwall.com/lists/oss-security/2021/10/08/6 Mailing List, Third Party Advisory
    Changed Reference Type http://www.openwall.com/lists/oss-security/2021/10/09/1 Third Party Advisory http://www.openwall.com/lists/oss-security/2021/10/09/1 Mailing List, Third Party Advisory
    Changed Reference Type http://www.openwall.com/lists/oss-security/2021/10/11/4 Third Party Advisory http://www.openwall.com/lists/oss-security/2021/10/11/4 Mailing List, Patch, Third Party Advisory
    Changed Reference Type http://www.openwall.com/lists/oss-security/2021/10/15/3 No Types Assigned http://www.openwall.com/lists/oss-security/2021/10/15/3 Mailing List, Patch, Third Party Advisory
    Changed Reference Type http://www.openwall.com/lists/oss-security/2021/10/16/1 No Types Assigned http://www.openwall.com/lists/oss-security/2021/10/16/1 Mailing List, Third Party Advisory
    Changed Reference Type https://lists.apache.org/thread.html/r17a4c6ce9aff662efd9459e9d1850ab4a611cb23392fc68264c72cb3@%3Ccvs.httpd.apache.org%3E Mailing List, Vendor Advisory https://lists.apache.org/thread.html/r17a4c6ce9aff662efd9459e9d1850ab4a611cb23392fc68264c72cb3@%3Ccvs.httpd.apache.org%3E Mailing List, Patch, Vendor Advisory
    Changed Reference Type https://lists.fedoraproject.org/archives/list/[email protected]/message/RMIIEFINL6FUIOPD2A3M5XC6DH45Y3CC/ No Types Assigned https://lists.fedoraproject.org/archives/list/[email protected]/message/RMIIEFINL6FUIOPD2A3M5XC6DH45Y3CC/ Mailing List, Third Party Advisory
    Changed Reference Type https://lists.fedoraproject.org/archives/list/[email protected]/message/WS5RVHOIIRECG65ZBTZY7IEJVWQSQPG3/ No Types Assigned https://lists.fedoraproject.org/archives/list/[email protected]/message/WS5RVHOIIRECG65ZBTZY7IEJVWQSQPG3/ Mailing List, Third Party Advisory
    Changed Reference Type https://security.netapp.com/advisory/ntap-20211029-0009/ No Types Assigned https://security.netapp.com/advisory/ntap-20211029-0009/ Third Party Advisory
    Added CPE Configuration OR *cpe:2.3:o:fedoraproject:fedora:34:*:*:*:*:*:*:* *cpe:2.3:o:fedoraproject:fedora:35:*:*:*:*:*:*:*
  • CVE Modified by [email protected]

    Nov. 11, 2021

    Action Type Old Value New Value
    Added Reference http://packetstormsecurity.com/files/164941/Apache-HTTP-Server-2.4.50-Remote-Code-Execution.html [No Types Assigned]
  • CVE Modified by [email protected]

    Oct. 29, 2021

    Action Type Old Value New Value
    Added Reference https://security.netapp.com/advisory/ntap-20211029-0009/ [No Types Assigned]
  • CVE Modified by [email protected]

    Oct. 25, 2021

    Action Type Old Value New Value
    Added Reference http://packetstormsecurity.com/files/164629/Apache-2.4.49-2.4.50-Traversal-Remote-Code-Execution.html [No Types Assigned]
  • CVE Modified by [email protected]

    Oct. 16, 2021

    Action Type Old Value New Value
    Added Reference http://www.openwall.com/lists/oss-security/2021/10/16/1 [No Types Assigned]
  • CVE Modified by [email protected]

    Oct. 15, 2021

    Action Type Old Value New Value
    Added Reference http://www.openwall.com/lists/oss-security/2021/10/15/3 [No Types Assigned]
  • CVE Modified by [email protected]

    Oct. 15, 2021

    Action Type Old Value New Value
    Added Reference https://lists.fedoraproject.org/archives/list/[email protected]/message/WS5RVHOIIRECG65ZBTZY7IEJVWQSQPG3/ [No Types Assigned]
  • CVE Modified by [email protected]

    Oct. 13, 2021

    Action Type Old Value New Value
    Added Reference https://lists.fedoraproject.org/archives/list/[email protected]/message/RMIIEFINL6FUIOPD2A3M5XC6DH45Y3CC/ [No Types Assigned]
  • Initial Analysis by [email protected]

    Oct. 12, 2021

    Action Type Old Value New Value
    Added CVSS V2 NIST (AV:N/AC:M/Au:N/C:P/I:N/A:N)
    Added CVSS V3.1 NIST AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
    Changed Reference Type http://packetstormsecurity.com/files/164418/Apache-HTTP-Server-2.4.49-Path-Traversal.html No Types Assigned http://packetstormsecurity.com/files/164418/Apache-HTTP-Server-2.4.49-Path-Traversal.html Exploit, Third Party Advisory, VDB Entry
    Changed Reference Type http://packetstormsecurity.com/files/164418/Apache-HTTP-Server-2.4.49-Path-Traversal-Remote-Code-Execution.html No Types Assigned http://packetstormsecurity.com/files/164418/Apache-HTTP-Server-2.4.49-Path-Traversal-Remote-Code-Execution.html Exploit, Third Party Advisory
    Changed Reference Type http://www.openwall.com/lists/oss-security/2021/10/05/2 No Types Assigned http://www.openwall.com/lists/oss-security/2021/10/05/2 Mailing List, Third Party Advisory
    Changed Reference Type http://www.openwall.com/lists/oss-security/2021/10/07/1 No Types Assigned http://www.openwall.com/lists/oss-security/2021/10/07/1 Third Party Advisory
    Changed Reference Type http://www.openwall.com/lists/oss-security/2021/10/07/6 No Types Assigned http://www.openwall.com/lists/oss-security/2021/10/07/6 Third Party Advisory
    Changed Reference Type http://www.openwall.com/lists/oss-security/2021/10/08/1 No Types Assigned http://www.openwall.com/lists/oss-security/2021/10/08/1 Third Party Advisory
    Changed Reference Type http://www.openwall.com/lists/oss-security/2021/10/08/2 No Types Assigned http://www.openwall.com/lists/oss-security/2021/10/08/2 Third Party Advisory
    Changed Reference Type http://www.openwall.com/lists/oss-security/2021/10/08/3 No Types Assigned http://www.openwall.com/lists/oss-security/2021/10/08/3 Third Party Advisory
    Changed Reference Type http://www.openwall.com/lists/oss-security/2021/10/08/4 No Types Assigned http://www.openwall.com/lists/oss-security/2021/10/08/4 Third Party Advisory
    Changed Reference Type http://www.openwall.com/lists/oss-security/2021/10/08/5 No Types Assigned http://www.openwall.com/lists/oss-security/2021/10/08/5 Third Party Advisory
    Changed Reference Type http://www.openwall.com/lists/oss-security/2021/10/08/6 No Types Assigned http://www.openwall.com/lists/oss-security/2021/10/08/6 Third Party Advisory
    Changed Reference Type http://www.openwall.com/lists/oss-security/2021/10/09/1 No Types Assigned http://www.openwall.com/lists/oss-security/2021/10/09/1 Third Party Advisory
    Changed Reference Type http://www.openwall.com/lists/oss-security/2021/10/11/4 No Types Assigned http://www.openwall.com/lists/oss-security/2021/10/11/4 Third Party Advisory
    Changed Reference Type https://httpd.apache.org/security/vulnerabilities_24.html No Types Assigned https://httpd.apache.org/security/vulnerabilities_24.html Vendor Advisory
    Changed Reference Type https://lists.apache.org/thread.html/r17a4c6ce9aff662efd9459e9d1850ab4a611cb23392fc68264c72cb3@%3Ccvs.httpd.apache.org%3E No Types Assigned https://lists.apache.org/thread.html/r17a4c6ce9aff662efd9459e9d1850ab4a611cb23392fc68264c72cb3@%3Ccvs.httpd.apache.org%3E Mailing List, Vendor Advisory
    Changed Reference Type https://lists.apache.org/thread.html/r6abf5f2ba6f1aa8b1030f95367aaf17660c4e4c78cb2338aee18982f@%3Cusers.httpd.apache.org%3E No Types Assigned https://lists.apache.org/thread.html/r6abf5f2ba6f1aa8b1030f95367aaf17660c4e4c78cb2338aee18982f@%3Cusers.httpd.apache.org%3E Mailing List, Vendor Advisory
    Changed Reference Type https://lists.apache.org/thread.html/r7c795cd45a3384d4d27e57618a215b0ed19cb6ca8eb070061ad5d837@%3Cannounce.apache.org%3E No Types Assigned https://lists.apache.org/thread.html/r7c795cd45a3384d4d27e57618a215b0ed19cb6ca8eb070061ad5d837@%3Cannounce.apache.org%3E Mailing List, Vendor Advisory
    Changed Reference Type https://lists.apache.org/thread.html/r98d704ed4377ed889d40479db79ed1ee2f43b2ebdd79ce84b042df45@%3Cannounce.apache.org%3E No Types Assigned https://lists.apache.org/thread.html/r98d704ed4377ed889d40479db79ed1ee2f43b2ebdd79ce84b042df45@%3Cannounce.apache.org%3E Mailing List, Vendor Advisory
    Changed Reference Type https://lists.apache.org/thread.html/rb5b0e46f179f60b0c70204656bc52fcb558e961cb4d06a971e9e3efb@%3Cusers.httpd.apache.org%3E No Types Assigned https://lists.apache.org/thread.html/rb5b0e46f179f60b0c70204656bc52fcb558e961cb4d06a971e9e3efb@%3Cusers.httpd.apache.org%3E Mailing List, Vendor Advisory
    Changed Reference Type https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-apache-httpd-pathtrv-LAzg68cZ No Types Assigned https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-apache-httpd-pathtrv-LAzg68cZ Third Party Advisory
    Added CWE NIST CWE-22
    Added CPE Configuration OR *cpe:2.3:a:apache:http_server:2.4.49:*:*:*:*:*:*:*
  • CVE Modified by [email protected]

    Oct. 11, 2021

    Action Type Old Value New Value
    Added Reference http://www.openwall.com/lists/oss-security/2021/10/11/4 [No Types Assigned]
  • CVE Modified by [email protected]

    Oct. 11, 2021

    Action Type Old Value New Value
    Changed Description A flaw was found in a change made to path normalization in Apache HTTP Server 2.4.49. An attacker could use a path traversal attack to map URLs to files outside the expected document root. If files outside of the document root are not protected by "require all denied" these requests can succeed. Additionally this flaw could leak the source of interpreted files like CGI scripts. This issue is known to be exploited in the wild. This issue only affects Apache 2.4.49 and not earlier versions. A flaw was found in a change made to path normalization in Apache HTTP Server 2.4.49. An attacker could use a path traversal attack to map URLs to files outside the directories configured by Alias-like directives. If files outside of these directories are not protected by the usual default configuration "require all denied", these requests can succeed. If CGI scripts are also enabled for these aliased pathes, this could allow for remote code execution. This issue is known to be exploited in the wild. This issue only affects Apache 2.4.49 and not earlier versions. The fix in Apache HTTP Server 2.4.50 was found to be incomplete, see CVE-2021-42013.
  • CVE Modified by [email protected]

    Oct. 09, 2021

    Action Type Old Value New Value
    Added Reference http://www.openwall.com/lists/oss-security/2021/10/08/6 [No Types Assigned]
    Added Reference http://www.openwall.com/lists/oss-security/2021/10/08/5 [No Types Assigned]
    Added Reference http://www.openwall.com/lists/oss-security/2021/10/09/1 [No Types Assigned]
  • CVE Modified by [email protected]

    Oct. 09, 2021

    Action Type Old Value New Value
    Added Reference http://www.openwall.com/lists/oss-security/2021/10/08/4 [No Types Assigned]
    Added Reference http://www.openwall.com/lists/oss-security/2021/10/08/3 [No Types Assigned]
  • CVE Modified by [email protected]

    Oct. 08, 2021

    Action Type Old Value New Value
    Added Reference http://www.openwall.com/lists/oss-security/2021/10/08/2 [No Types Assigned]
  • CVE Modified by [email protected]

    Oct. 08, 2021

    Action Type Old Value New Value
    Added Reference https://lists.apache.org/thread.html/r17a4c6ce9aff662efd9459e9d1850ab4a611cb23392fc68264c72cb3@%3Ccvs.httpd.apache.org%3E [No Types Assigned]
  • CVE Modified by [email protected]

    Oct. 08, 2021

    Action Type Old Value New Value
    Added Reference http://www.openwall.com/lists/oss-security/2021/10/08/1 [No Types Assigned]
  • CVE Modified by [email protected]

    Oct. 07, 2021

    Action Type Old Value New Value
    Added Reference https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-apache-httpd-pathtrv-LAzg68cZ [No Types Assigned]
  • CVE Modified by [email protected]

    Oct. 07, 2021

    Action Type Old Value New Value
    Added Reference http://www.openwall.com/lists/oss-security/2021/10/07/6 [No Types Assigned]
  • CVE Modified by [email protected]

    Oct. 07, 2021

    Action Type Old Value New Value
    Added Reference https://lists.apache.org/thread.html/r7c795cd45a3384d4d27e57618a215b0ed19cb6ca8eb070061ad5d837@%3Cannounce.apache.org%3E [No Types Assigned]
    Added Reference https://lists.apache.org/thread.html/rb5b0e46f179f60b0c70204656bc52fcb558e961cb4d06a971e9e3efb@%3Cusers.httpd.apache.org%3E [No Types Assigned]
  • CVE Modified by [email protected]

    Oct. 07, 2021

    Action Type Old Value New Value
    Added Reference http://packetstormsecurity.com/files/164418/Apache-HTTP-Server-2.4.49-Path-Traversal-Remote-Code-Execution.html [No Types Assigned]
  • CVE Modified by [email protected]

    Oct. 07, 2021

    Action Type Old Value New Value
    Added Reference http://www.openwall.com/lists/oss-security/2021/10/07/1 [No Types Assigned]
  • CVE Modified by [email protected]

    Oct. 06, 2021

    Action Type Old Value New Value
    Added Reference http://packetstormsecurity.com/files/164418/Apache-HTTP-Server-2.4.49-Path-Traversal.html [No Types Assigned]
  • CVE Modified by [email protected]

    Oct. 05, 2021

    Action Type Old Value New Value
    Added Reference http://www.openwall.com/lists/oss-security/2021/10/05/2 [No Types Assigned]
  • CVE Modified by [email protected]

    Oct. 05, 2021

    Action Type Old Value New Value
    Added Reference https://lists.apache.org/thread.html/r98d704ed4377ed889d40479db79ed1ee2f43b2ebdd79ce84b042df45@%3Cannounce.apache.org%3E [No Types Assigned]
  • CVE Modified by [email protected]

    Oct. 05, 2021

    Action Type Old Value New Value
    Added Reference https://lists.apache.org/thread.html/r6abf5f2ba6f1aa8b1030f95367aaf17660c4e4c78cb2338aee18982f@%3Cusers.httpd.apache.org%3E [No Types Assigned]
EPSS is a daily estimate of the probability of exploitation activity being observed over the next 30 days. Following chart shows the EPSS score history of the vulnerability.
Vulnerability Scoring Details
Base CVSS Score: 7.5
Attack Vector
Attack Complexity
Privileges Required
User Interaction
Scope
Confidentiality Impact
Integrity Impact
Availability Impact
Base CVSS Score: 4.3
Access Vector
Access Complexity
Authentication
Confidentiality Impact
Integrity Impact
Availability Impact
Exploit Prediction

EPSS is a daily estimate of the probability of exploitation activity being observed over the next 30 days.

94.37 }} -0.02%

score

0.99960

percentile