Entreprise d'experts en Sécurité Informatique : Audits et conseils en cybersécurité
Entreprise française de cybersécurité depuis 2004
☎ 03 60 47 09 81 - info@securiteinfo.com


CVE-2021-33193

Description

A crafted method sent through HTTP/2 will bypass validation and be forwarded by mod_proxy, which can lead to request splitting or cache poisoning. This issue affects Apache HTTP Server 2.4.17 to 2.4.48.

POC

Reference

- https://portswigger.net/research/http2

- https://www.oracle.com/security-alerts/cpuapr2022.html

- https://www.oracle.com/security-alerts/cpujan2022.html

Github

- https://github.com/20142995/nuclei-templates

- https://github.com/ARPSyndicate/cvemon

- https://github.com/CHYbeta/OddProxyDemo

- https://github.com/NeoOniX/5ATTACK

- https://github.com/PierreChrd/py-projet-tut

- https://github.com/Samaritin/OSINT

- https://github.com/Totes5706/TotesHTB

- https://github.com/austin-lai/External-Penetration-Testing-Holo-Corporate-Network-TryHackMe-Holo-Network

- https://github.com/bioly230/THM_Skynet

- https://github.com/cyb3r-w0lf/nuclei-template-collection

- https://github.com/jkiala2/Projet_etude_M1

- https://github.com/n0-traces/cve_monitor

- https://github.com/nomi-sec/PoC-in-GitHub

- https://github.com/soosmile/POC