Apache Server - Remote Code Execution (CVE-2021-42013)
- Severity
- CVSSv3 Score
- 9.8
- Vulnerability description
Apache server is affected by a Remote Code Execution vulnerability, located on the /cgi-bin endpoint. If CGI (mod-cgi) has been explicitly enabled on the server and files outside the document root are not protected with the "require all denied" configuration, an unauthenticated remote attacker can access arbitrary binaries from the file system (ex.
/bin/sh
) and execute commands on the server. The root cause of this vulnerability consists in a change done to the path normalization code in 2.4.49-2.4.50 versions of Apache Server. Only this specific versions are affected.- Risk description
The risk exists that a remote unauthenticated attacker can fully compromise the server in order to steal confidential information, install ransomware or pivot to the internal network.
- Exploit capabilities
Sniper can gain unauthenticated Remote Code Execution on the target system and extract multiple artefacts as evidence.
- Recommendation
Upgrade the Apache server to a version equal or higher than 2.4.51.
- Codename
- Not available
- Detectable with
- Network Scanner
- Exploitable with Sniper
- Yes
- Vuln date
- Oct 2021
- Published at
- Updated at
- Software Type
- Web server
- Vendor
- Apache
- Product
- Server