Files
CVEs-PoC/2021/CVE-2021-44224.md
2025-09-29 21:09:30 +02:00

33 lines
1.5 KiB
Markdown

### [CVE-2021-44224](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44224)
![](https://img.shields.io/static/v1?label=Product&message=Apache%20HTTP%20Server&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=2.4.7%20&color=brightgreen)
![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-476%20NULL%20Pointer%20Dereference&color=brightgreen)
### Description
A crafted URI sent to httpd configured as a forward proxy (ProxyRequests on) can cause a crash (NULL pointer dereference) or, for configurations mixing forward and reverse proxy declarations, can allow for requests to be directed to a declared Unix Domain Socket endpoint (Server Side Request Forgery). This issue affects Apache HTTP Server 2.4.7 up to 2.4.51 (included).
### POC
#### Reference
- https://www.oracle.com/security-alerts/cpuapr2022.html
- https://www.oracle.com/security-alerts/cpujan2022.html
#### Github
- https://github.com/0xMR007/PyScanner
- https://github.com/1mR007/PyScanner
- https://github.com/20142995/nuclei-templates
- https://github.com/ARPSyndicate/cve-scores
- https://github.com/ARPSyndicate/cvemon
- https://github.com/NeoOniX/5ATTACK
- https://github.com/PierreChrd/py-projet-tut
- https://github.com/Samaritin/OSINT
- https://github.com/Totes5706/TotesHTB
- https://github.com/Volkiaa/nmap-terminal-viz
- https://github.com/bioly230/THM_Skynet
- https://github.com/cyb3r-w0lf/nuclei-template-collection
- https://github.com/firatesatoglu/shodanSearch
- https://github.com/jkiala2/Projet_etude_M1
- https://github.com/nullenc0de/vulnseer