mirror of
https://github.com/0xMarcio/cve.git
synced 2026-02-12 18:42:46 +00:00
33 lines
1.5 KiB
Markdown
33 lines
1.5 KiB
Markdown
### [CVE-2021-44224](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44224)
|
|

|
|

|
|

|
|
|
|
### Description
|
|
|
|
A crafted URI sent to httpd configured as a forward proxy (ProxyRequests on) can cause a crash (NULL pointer dereference) or, for configurations mixing forward and reverse proxy declarations, can allow for requests to be directed to a declared Unix Domain Socket endpoint (Server Side Request Forgery). This issue affects Apache HTTP Server 2.4.7 up to 2.4.51 (included).
|
|
|
|
### POC
|
|
|
|
#### Reference
|
|
- https://www.oracle.com/security-alerts/cpuapr2022.html
|
|
- https://www.oracle.com/security-alerts/cpujan2022.html
|
|
|
|
#### Github
|
|
- https://github.com/0xMR007/PyScanner
|
|
- https://github.com/1mR007/PyScanner
|
|
- https://github.com/20142995/nuclei-templates
|
|
- https://github.com/ARPSyndicate/cve-scores
|
|
- https://github.com/ARPSyndicate/cvemon
|
|
- https://github.com/NeoOniX/5ATTACK
|
|
- https://github.com/PierreChrd/py-projet-tut
|
|
- https://github.com/Samaritin/OSINT
|
|
- https://github.com/Totes5706/TotesHTB
|
|
- https://github.com/Volkiaa/nmap-terminal-viz
|
|
- https://github.com/bioly230/THM_Skynet
|
|
- https://github.com/cyb3r-w0lf/nuclei-template-collection
|
|
- https://github.com/firatesatoglu/shodanSearch
|
|
- https://github.com/jkiala2/Projet_etude_M1
|
|
- https://github.com/nullenc0de/vulnseer
|
|
|