### [CVE-2012-0883](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0883) ![](https://img.shields.io/static/v1?label=Product&message=n%2Fa&color=blue) ![](https://img.shields.io/static/v1?label=Version&message=n%2Fa%20&color=brightgreen) ![](https://img.shields.io/static/v1?label=Vulnerability&message=n%2Fa&color=brightgreen) ### Description envvars (aka envvars-std) in the Apache HTTP Server before 2.4.2 places a zero-length directory name in the LD_LIBRARY_PATH, which allows local users to gain privileges via a Trojan horse DSO in the current working directory during execution of apachectl. ### POC #### Reference No PoCs from references. #### Github - https://github.com/8ctorres/SIND-Practicas - https://github.com/ARPSyndicate/cvemon - https://github.com/CYB3RLEO/Apache_web_server_recon_and_enumeration_on_metasploitable2 - https://github.com/DButter/whitehat_public - https://github.com/Dmitri131313/ReconScan - https://github.com/Dokukin1/Metasploitable - https://github.com/Furious992/HW13-01 - https://github.com/GiJ03/ReconScan - https://github.com/Iknowmyname/Nmap-Scans-M2 - https://github.com/Live-Hack-CVE/CVE-2012-0883 - https://github.com/NikulinMS/13-01-hw - https://github.com/RoliSoft/ReconScan - https://github.com/SecureAxom/strike - https://github.com/Zhivarev/13-01-hw - https://github.com/issdp/test - https://github.com/krlabs/apache-vulnerabilities - https://github.com/lekctut/sdb-hw-13-01 - https://github.com/matoweb/Enumeration-Script - https://github.com/mrt2h/DZ - https://github.com/pedr0alencar/vlab-metasploitable2 - https://github.com/smabramov/Vulnerabilities-and-attacks-on-information-systems - https://github.com/syadg123/pigat - https://github.com/teamssix/pigat - https://github.com/xxehacker/strike - https://github.com/zzzWTF/db-13-01