关联漏洞
标题:
Apache HTTP Server 代码问题漏洞
(CVE-2021-40438)
描述:Apache HTTP Server是美国阿帕奇(Apache)基金会的一款开源网页服务器。该服务器具有快速、可靠且可通过简单的API进行扩充的特点。 Apache HTTP Server存在代码问题漏洞,该漏洞是由于系统对用户的输入没有进行严格的过滤导致,攻击者可以构造恶意数据对目标服务器进行SSRF攻击。该漏洞可做为攻击目标服务器内网的跳板,以此对服务器所在内网进行端口扫描、攻击运行在内网的应用程序、下载内网资源等。
描述
Apache <= 2.4.48 Mod_Proxy - Server-Side Request Forgery
介绍
<div align="center">
<img src="https://blogs.cappriciosec.com/uploaders/CVE-2021-40438.png" alt="logo">
</div>
## Badges
[](https://choosealicense.com/licenses/mit/)



<a href="https://github.com/Cappricio-Securities/CVE-2021-40438/releases/"><img src="https://img.shields.io/github/release/Cappricio-Securities/CVE-2021-40438"></a>
[](https://twitter.com/cappricio_sec)
<p align="center">
<p align="center">
## License
[MIT](https://choosealicense.com/licenses/mit/)
## Installation
1. Install Python3 and pip [Instructions Here](https://www.python.org/downloads/) (If you can't figure this out, you shouldn't really be using this)
- Install via pip
- ```bash
pip install CVE-2021-40438
```
- Run bellow command to check
- `CVE-2021-40438 -h`
## Configurations
2. We integrated with the Telegram API to receive instant notifications for vulnerability detection.
- Telegram Notification
- ```bash
CVE-2021-40438 --chatid <YourTelegramChatID>
```
- Open your telegram and search for [`@CappricioSecuritiesTools_bot`](https://web.telegram.org/k/#@CappricioSecuritiesTools_bot) and click start
## Usages
3. This tool has multiple use cases.
- To Check Single URL
- ```bash
CVE-2021-40438 -u http://example.com
```
- To Check List of URL
- ```bash
CVE-2021-40438 -i urls.txt
```
- Save output into TXT file
- ```bash
CVE-2021-40438 -i urls.txt -o out.txt
```
- Want to Learn about [`CVE-2021-40438`](https://blogs.cappriciosec.com/cve/152/CVE-2021-40438)? Then Type Below command
- ```bash
CVE-2021-40438 -b
```
<p align="center">
<b>🚨 Disclaimer</b>
</p>
<p align="center">
<b>This tool is created for security bug identification and assistance; Cappricio Securities is not liable for any illegal use.
Use responsibly within legal and ethical boundaries. 🔐🛡️</b></p>
## Working PoC Video
[](https://asciinema.org/a/3wzQbQUrSPbB4MM8EGOrseryo)
## Help menu
#### Get all items
```bash
👋 Hey Hacker
v1.0
_______ ________ ___ ____ ___ ___ __ __ ____ __ __ _____ ____
/ ____/ | / / ____/ |__ \ / __ \__ \< / / // / / __ \/ // /|__ /( __ )
/ / | | / / __/________/ // / / /_/ // /_____/ // /_/ / / / // /_ /_ </ __ |
/ /___ | |/ / /__/_____/ __// /_/ / __// /_____/__ __/ /_/ /__ __/__/ / /_/ /
\____/ |___/_____/ /____/\____/____/_/ /_/ \____/ /_/ /____/\____/
Developed By https://cappriciosec.com
CVE-2021-40438 : Bug scanner for WebPentesters and Bugbounty Hunters
$ CVE-2021-40438 [option]
Usage: CVE-2021-40438 [options]
```
| Argument | Type | Description | Examples |
| :-------- | :------- | :------------------------- | :------------------------- |
| `-u` | `--url` | URL to scan | CVE-2021-40438 -u https://target.com |
| `-i` | `--input` | filename Read input from txt | CVE-2021-40438 -i target.txt |
| `-o` | `--output` | filename Write output in txt file | CVE-2021-40438 -i target.txt -o output.txt |
| `-c` | `--chatid` | Creating Telegram Notification | CVE-2021-40438 --chatid yourid |
| `-b` | `--blog` | To Read about CVE-2021-40438 Bug | CVE-2021-40438 -b |
| `-h` | `--help` | Help Menu | CVE-2021-40438 -h |
## 🔗 Links
[](https://cappriciosec.com/)
[](https://www.linkedin.com/in/karthikeyan--v/)
[](https://twitter.com/karthithehacker)
## Author
- [@karthithehacker](https://github.com/karthi-the-hacker/)
## Feedback
If you have any feedback, please reach out to us at contact@karthithehacker.com
文件快照
[4.0K] /data/pocs/0db54b2f9c6afac0ba98e6ea6bdf4cfc7cc6c09d
├── [4.0K] cve202140438
│ ├── [4.0K] includes
│ │ ├── [ 654] bot.py
│ │ ├── [ 470] filereader.py
│ │ ├── [ 0] __init__.py
│ │ ├── [2.2K] scan.py
│ │ └── [ 285] writefile.py
│ ├── [1.7K] main.py
│ └── [4.0K] utils
│ ├── [1.9K] configure.py
│ ├── [ 895] const.py
│ ├── [2.3K] helpers.py
│ ├── [ 0] __init__.py
│ └── [ 227] status.py
├── [1.0K] LICENSE
├── [4.6K] README.md
└── [ 996] setup.py
3 directories, 14 files
备注
1. 建议优先通过来源进行访问。
2. 如果因为来源失效或无法访问,请发送邮箱到 f.jinxu#gmail.com 索取本地快照(把 # 换成 @)。
3. 神龙已为您对POC代码进行快照,为了长期维护,请考虑为本地POC付费,感谢您的支持。