Entreprise d'experts en Sécurité Informatique : Audits et conseils en cybersécurité
Entreprise française de cybersécurité depuis 2004
☎ 03 60 47 09 81 - info@securiteinfo.com


CVE-2021-41773

Description

A flaw was found in a change made to path normalization in Apache HTTP Server 2.4.49. An attacker could use a path traversal attack to map URLs to files outside the directories configured by Alias-like directives. If files outside of these directories are not protected by the usual default configuration "require all denied", these requests can succeed. If CGI scripts are also enabled for these aliased pathes, this could allow for remote code execution. This issue is known to be exploited in the wild. This issue only affects Apache 2.4.49 and not earlier versions. The fix in Apache HTTP Server 2.4.50 was found to be incomplete, see CVE-2021-42013.

POC

Reference

- http://packetstormsecurity.com/files/164418/Apache-HTTP-Server-2.4.49-Path-Traversal-Remote-Code-Execution.html

- http://packetstormsecurity.com/files/164418/Apache-HTTP-Server-2.4.49-Path-Traversal.html

- http://packetstormsecurity.com/files/164629/Apache-2.4.49-2.4.50-Traversal-Remote-Code-Execution.html

- http://packetstormsecurity.com/files/164941/Apache-HTTP-Server-2.4.50-Remote-Code-Execution.html

- https://www.oracle.com/security-alerts/cpujan2022.html

Github

- https://github.com/0day404/vulnerability-poc

- https://github.com/0day666/Vulnerability-verification

- https://github.com/0e0w/GoHackTools

- https://github.com/0x3n0/redeam

- https://github.com/0x783kb/Security-operation-book

- https://github.com/0x7n6/OSCP

- https://github.com/0xAlmighty/CVE-2021-41773-PoC

- https://github.com/0xGabe/Apache-CVEs

- https://github.com/0xIceKing/dfcf_def_atk_2024

- https://github.com/0xRar/CVE-2021-41773

- https://github.com/0xStrygwyr/OSCP-Guide

- https://github.com/0xZipp0/OSCP

- https://github.com/0xabdoulaye/CTFs-Journey

- https://github.com/0xb0rn3/r3cond0g

- https://github.com/0xc4t/CVE-2021-41773

- https://github.com/0xfke/500-free-TryHackMe-rooms

- https://github.com/0xkarthi/Tryhackme-Roadmap

- https://github.com/0xneobyte/TryHackMe-Learning-Path-From-Beginner-to-Expert

- https://github.com/0xsyr0/OSCP

- https://github.com/11x-singhamit/Port-Scanner-with-Vulnerability-Awareness

- https://github.com/12345qwert123456/CVE-2021-41773

- https://github.com/189569400/Meppo

- https://github.com/1BladeForm/Cyb04_Dip

- https://github.com/1nhann/CVE-2021-41773

- https://github.com/20142995/Goby

- https://github.com/20142995/nuclei-templates

- https://github.com/20142995/pocsuite3

- https://github.com/34zY/APT-Backpack

- https://github.com/4ra1n/poc-runner

- https://github.com/5gstudent/cve-2021-41773-and-cve-2021-42013

- https://github.com/5l1v3r1/CVE-2021-41773-42013

- https://github.com/5thphlame/Free-Rooms-TryHackMe

- https://github.com/AMH-glitch/CHWA-LB-IDSDATASET

- https://github.com/AMatheusFeitosaM/OSCP-Cheat

- https://github.com/AMazkun/vuln-report-normalizer

- https://github.com/ARESHAmohanad/THM

- https://github.com/ARESHAmohanad/tryhackme

- https://github.com/ARPSyndicate/cve-scores

- https://github.com/ARPSyndicate/cvemon

- https://github.com/ARPSyndicate/kenzer-templates

- https://github.com/Abdulaziz-AlZabin/IEEE_Questions

- https://github.com/AdrMAr5/baiim

- https://github.com/Aezlan/ProjectMagenta-Site-Building

- https://github.com/AhenKay/INPT_report

- https://github.com/Aijoo100/Aijoo100

- https://github.com/Aimane-H/rce_pathtraversal

- https://github.com/Aimane-H/rcepathtraversal

- https://github.com/AkshayraviC09YC47/CVE-Exploits

- https://github.com/Alb-310/RavenThief

- https://github.com/Alecto-Fsociety/Nova_Observer-Beta

- https://github.com/AlienTec1908/Apaches_HackMyVM_Easy

- https://github.com/Amit29533/Global-Attack-Map

- https://github.com/Ankitkushwaha90/CyberMind_LLM

- https://github.com/AnonymouID/POC

- https://github.com/AnonymousCTF/TryHackMe-Roadmap

- https://github.com/AntonShadzin/Diplom_Cyb04

- https://github.com/ArrestX/--POC

- https://github.com/AssassinUKG/CVE-2021-41773

- https://github.com/Awrrays/FrameVul

- https://github.com/AzK-os-dev/CVE-2021-41773

- https://github.com/BEPb/tryhackme

- https://github.com/BabyTeam1024/CVE-2021-41773

- https://github.com/Balgogan/CVE-2021-41773

- https://github.com/Bhagat-CyberWala/TryHackMe-Free-Roadmap

- https://github.com/BluHExH/Hex-pentest

- https://github.com/BlueTeamSteve/CVE-2021-41773

- https://github.com/ButchBytes-sec/TryHackMe

- https://github.com/CHYbeta/Vuln100Topics

- https://github.com/CHYbeta/Vuln100Topics20

- https://github.com/CLincat/vulcat

- https://github.com/CVEDB/PoC-List

- https://github.com/CVEDB/awesome-cve-repo

- https://github.com/CVEDB/top

- https://github.com/CalfCrusher/Path-traversal-RCE-Apache-2.4.49-2.4.50-Exploit

- https://github.com/CamillaMagistrello/gmpScan

- https://github.com/ChalkingCode/ExploitedDucks

- https://github.com/Chocapikk/CVE-2021-41773

- https://github.com/CodingChatRoom/Advance-Reconnaissance-

- https://github.com/ComdeyOverflow/CVE-2021-41773

- https://github.com/ConstantineCTF/CTFBlitz

- https://github.com/CybVulnHunter/TryhackME_Rooms

- https://github.com/CyberMelloVX/VulnScannerPro_Full

- https://github.com/CyberQuestor-infosec/CVE-2021-41773-Apache_2.4.49-Path-traversal-to-RCE

- https://github.com/DanielShmu/OSCP-Cheat-Sheet

- https://github.com/Danieltwerk/Daniel

- https://github.com/Davida-AduGyamfi/INPT

- https://github.com/Desofori/Tryhackme-RoadMap

- https://github.com/Dh4v4l8/TRYHACKME-ROOMS

- https://github.com/DoTuan1/Reserch-CVE-2021-41773

- https://github.com/Dorsaa-Francis/inpt_report

- https://github.com/DrAmmarMoustafa/CHASE-LB-Container-Dataset

- https://github.com/DrAmmarMoustafa/CHASE-LB-Container-IDS-Dataset

- https://github.com/Drajoncr/AttackWebFrameworkTools

- https://github.com/DylanD-C723/python-based-network-vulnerability-scanner

- https://github.com/EagleTube/CVE-2021-41773

- https://github.com/EkamSinghWalia/Mitigation-Apache-CVE-2021-41773-

- https://github.com/EnriqueSanchezdelVillar/NotesHck

- https://github.com/Esther7171/THM-Walkthroughs

- https://github.com/Esther7171/TryHackMe-Walkthroughs

- https://github.com/FDlucifer/firece-fish

- https://github.com/Fa1c0n35/CVE-2021-41773

- https://github.com/Faizan-Khanx/OSCP

- https://github.com/FakesiteSecurity/CVE-2021-41773

- https://github.com/Farrhouq/Inpt-report

- https://github.com/Fireeeeeeee/Web-API-Security-Detection-System

- https://github.com/FirikiIntelligence/Courses

- https://github.com/GSayali-D/Internship-task-report

- https://github.com/GavinTheArchitect/ShatterpointAI

- https://github.com/Gekonisko/CTF

- https://github.com/GhostTroops/TOP

- https://github.com/GibzB/THM-Captured-Rooms

- https://github.com/H0j3n/EzpzCheatSheet

- https://github.com/H0j3n/EzpzShell

- https://github.com/H4cking2theGate/TraversalHunter

- https://github.com/HITOUBEN/MSPR3

- https://github.com/HK4040/ssh_bootcamp

- https://github.com/Habib0x0/CVE-2021-41773

- https://github.com/Hattan-515/POC-CVE-2021-41773

- https://github.com/Hattan515/POC-CVE-2021-41773

- https://github.com/HernanRodriguez1/Dorks-Shodan-2023

- https://github.com/HightechSec/scarce-apache2

- https://github.com/HimmelAward/Goby_POC

- https://github.com/Hunterdii/TryHackMe-Roadmap

- https://github.com/Hunterdii/tryhackme-free-rooms

- https://github.com/HxDDD/CVE-PoC

- https://github.com/Hydragyrum/CVE-2021-41773-Playground

- https://github.com/IcmpOff/Apache-2.4.49-2.4.50-Traversal-Remote-Code-Execution-Exploit

- https://github.com/Ilovewomen/db_script_v2

- https://github.com/Ilovewomen/db_script_v2_2

- https://github.com/Iris288/CVE-2021-41773

- https://github.com/JERRY123S/all-poc

- https://github.com/JIYUN02/cve-2021-41773

- https://github.com/JMontRod/Pruebecita

- https://github.com/Jeromeyoung/CVE-2021-41784

- https://github.com/Jhonsonwannaa/cve-2021-42013-apache

- https://github.com/JosephJMRG/apache-docker-project

- https://github.com/K3ysTr0K3R/CVE-2021-41773-EXPLOIT

- https://github.com/K3ysTr0K3R/CVE-2021-42013-EXPLOIT

- https://github.com/KNIGHTPROJEKS-0/LANCELOTT

- https://github.com/KarimLedesmaHaron/THM-Tutoriales

- https://github.com/KayCHENvip/vulnerability-poc

- https://github.com/KerFew/TryHackMeFreePath

- https://github.com/KhushiV099/Project_Ubuntu

- https://github.com/Konstans8/Diplom-SyberSEC

- https://github.com/LayarKacaSiber/CVE-2021-41773

- https://github.com/LeGai325/CVE-Scanner-Tool

- https://github.com/LeonardoE95/OSCP

- https://github.com/LetouRaphael/Poc-CVE-2021-41773

- https://github.com/LoSunny/vulnerability-testing

- https://github.com/Lokidres/seeyou-port_scanner

- https://github.com/Ls4ss/CVE-2021-41773_CVE-2021-42013

- https://github.com/Lucky9113/Automated-Vulnerability-Scanner-Management-Tool

- https://github.com/LudovicPatho/CVE-2021-41773

- https://github.com/Ly0nt4r/OSCP

- https://github.com/MagicGautam/CVEs-Proof-Of-Concept

- https://github.com/Mangesh-Bhattacharya/TryHackMe-Roadmap

- https://github.com/MatanelGordon/docker-cve-2021-41773

- https://github.com/Maybe4a6f7365/CVE-2021-41773

- https://github.com/MazX0p/CVE-2021-41773

- https://github.com/McSl0vv/CVE-2021-41773

- https://github.com/MinLouisCyber/500-free-TryHackMe-rooms

- https://github.com/Ming119/110-1_Network-and-System-Security_Midterm

- https://github.com/Miraitowa70/POC-Notes

- https://github.com/Mohammed-Hafeez-99/THM-checklist

- https://github.com/Mr-Tree-S/POC_EXP

- https://github.com/Mr-xn/Penetration_Testing_POC

- https://github.com/MrCl0wnLab/SimplesApachePathTraversal

- https://github.com/MuhammadHuzaifaAsif/security-lab

- https://github.com/N0el4kLs/Vulhub_Exp

- https://github.com/NZRXHX/NZRXNETSCANNER

- https://github.com/NaInSec/CVE-PoC-in-GitHub

- https://github.com/NerokiDoki/sec-scanner-final-project

- https://github.com/NoTsPepino/Shodan-Dorking

- https://github.com/NoWa-FTN/P3nUrM0M

- https://github.com/NyxAzrael/Goby_POC

- https://github.com/OfriOuzan/CVE-2021-41773_CVE-2021-42013_Exploits

- https://github.com/Ossito/pentest-notes

- https://github.com/Ostorlab/KEV

- https://github.com/Ostorlab/known_exploited_vulnerbilities_detectors

- https://github.com/PatriceBertin/FinTrade-Security-Strategy

- https://github.com/PatriceBertin/IT-SysAdmin

- https://github.com/Paulineclv/Port-Scanner

- https://github.com/PentesterGuruji/CVE-2021-41773

- https://github.com/Plunder283/CVE-2021-41773

- https://github.com/Pratham-verma/TryHackMe-Roadmap

- https://github.com/Princeton-Cybbs/Asare_Prince

- https://github.com/PuddinCat/GithubRepoSpider

- https://github.com/Quarrezz/CyberScan

- https://github.com/Ramiyuu/redteamtools

- https://github.com/ReflectedThanatos/OSCP-cheatsheet

- https://github.com/RizqiSec/CVE-2021-41773

- https://github.com/Rohithofficial08/NexScan

- https://github.com/Ruviixx/proyecto-ps

- https://github.com/RyouYoo/CVE-2021-41773

- https://github.com/SYRTI/POC_to_review

- https://github.com/Sakura-nee/CVE-2021-41773

- https://github.com/Samue290/INPT-REPORT

- https://github.com/SantoriuHen/NotesHck

- https://github.com/SenukDias/OSCP_cheat

- https://github.com/Shadow-warrior0/Apache_path_traversal

- https://github.com/Shadowven/Vulnerability_Reproduction

- https://github.com/Shatkouski/TMS

- https://github.com/Shayanschakravarthy/tryhackme-free-rooms

- https://github.com/Shinbatsu/awesome-tryhackme

- https://github.com/Shinbatsu/tryhackme-awesome

- https://github.com/SinMaven/BugSauce

- https://github.com/SirElmard/ethical_hacking

- https://github.com/Soliux/CVE-2021-41773

- https://github.com/SpriteCT/TryHackMe

- https://github.com/SyedAfzalHussain/network-security-scanner

- https://github.com/TAI-REx/cve-2021-41773-nse

- https://github.com/Taldrid1/cve-2021-41773

- https://github.com/Techkeemout/Nessus-Vulnerability-Assesstment

- https://github.com/ThatNotEasy/Apache-PathTraversal

- https://github.com/TheKernelPanic/exploit-apache2-cve-2021-41773

- https://github.com/TheLastVvV/CVE-2021-41773

- https://github.com/Threekiii/Awesome-POC

- https://github.com/Threekiii/Vulhub-Reproduce

- https://github.com/TishcaTpx/POC-CVE-2021-41773

- https://github.com/Tom-Riddle-4/IEEE_Questions

- https://github.com/Trivialcorgi/Proyecto-Prueba-PPS

- https://github.com/TrojanAZhen/Self_Back

- https://github.com/Undefind404/cve_2021_41773

- https://github.com/Valay-2004/THM-Learning-PATH-Beginner-to-Expert-

- https://github.com/Vanshuk-Bhagat/Apache-HTTP-Server-Vulnerabilities-CVE-2021-41773-and-CVE-2021-42013

- https://github.com/VishuGahlyan/OSCP

- https://github.com/Vulnmachines/cve-2021-41773

- https://github.com/Wh1teHatUn1c0rn/RedOps-Framework

- https://github.com/WhooAmii/POC_to_review

- https://github.com/WingsSec/Meppo

- https://github.com/XDUgaile/CVE-Scanner-Tool

- https://github.com/XiaomingX/awesome-poc-for-red-team

- https://github.com/XinLiu2025/openkylinsat

- https://github.com/Yang8miao/prov_navigator

- https://github.com/Z0fhack/Goby_POC

- https://github.com/Zeop-CyberSec/apache_normalize_path

- https://github.com/ZephrFish/CVE-2021-41773-PoC

- https://github.com/Zero094/Vulnerability-verification

- https://github.com/Zeyad-Azima/Remedy4me

- https://github.com/Zh0ngS0n1337/CVE-2021-41773

- https://github.com/Zyx2440/Apache-HTTP-Server-2.4.50-RCE

- https://github.com/a-krivlenya/TMS-CyberSecurity-Diplom

- https://github.com/abdullah89255/Manually-test-suspicious-findings

- https://github.com/abdullah89255/Penetration-testing-bug-bounty-reconnaissance

- https://github.com/abdullah89255/ShodanX-

- https://github.com/abdullah89255/nuclei-examples-with-detailed-explanations

- https://github.com/adnan-kutay-yuksel/tryhackme-all-rooms-database

- https://github.com/adugyeni/INPT_Report

- https://github.com/ahmad4fifz/CVE-2021-41773

- https://github.com/ahmad4fifz/CVE-2021-42013

- https://github.com/akyuksel/tryhackme-all-rooms-database

- https://github.com/amessedad/autoexploitGPT

- https://github.com/ana464646/reconjp

- https://github.com/angeulrichboni/VulnDB

- https://github.com/anldori/CVE-2021-41773-Scanner

- https://github.com/anquanscan/sec-tools

- https://github.com/apapedulimu/Apachuk

- https://github.com/aqiao-jashell/CVE-2021-41773

- https://github.com/aqiao-jashell/py-CVE-2021-41773

- https://github.com/aryanchoudhary11/CEH-Modules

- https://github.com/aryanchoudhary11/Scanning-Networks

- https://github.com/asaotomo/CVE-2021-42013-Apache-RCE-Poc-Exp

- https://github.com/ashique-thaha/CVE-2021-41773-POC

- https://github.com/atlasilim/Gohunt

- https://github.com/azazelm3dj3d/apache-traversal

- https://github.com/b1tsec/CVE-2021-41773

- https://github.com/b4sh0ne/b4sher

- https://github.com/bakery312/Vulhub-Reproduce

- https://github.com/balajiuk14/tryhackmelearningpath

- https://github.com/battleoverflow/apache-traversal

- https://github.com/belajarqywok/CVE-2021-41773-MSF

- https://github.com/belajarqywok/cve-2021-41773-msf

- https://github.com/bernardas/netsec-polygon

- https://github.com/beycanyildiz/TryHackMeRoadmap

- https://github.com/bhagat8920/TryHackMe-Free-Roadmap

- https://github.com/binganao/vulns-2022

- https://github.com/blackn0te/Apache-HTTP-Server-2.4.49-2.4.50-Path-Traversal-Remote-Code-Execution

- https://github.com/blasty/CVE-2021-41773

- https://github.com/blu3ming/PoC-CVE-2021-41773

- https://github.com/boniyeamincse/tryhackmefreeroom

- https://github.com/bpsarthur/labratz

- https://github.com/bryanqb07/oscp_notes

- https://github.com/byteofandri/CVE-2021-41773

- https://github.com/byteofjoshua/CVE-2021-41773

- https://github.com/capdegarde/apache_path_traversal

- https://github.com/cc8700619/poc

- https://github.com/cgddgc/CVE-2021-41773-42013

- https://github.com/ch4os443/CVE-2021-41773

- https://github.com/chandanmallick19/TryHackMe

- https://github.com/charanvoonna/CVE-2021-41773

- https://github.com/chav00ooo/CYB333-Final-VulnerabilityScanner

- https://github.com/chosenonehacks/Red-Team-tools-and-usefull-links

- https://github.com/cisagov/Malcolm

- https://github.com/cloudbyteelias/CVE-2021-41773

- https://github.com/codewhisperxai/ZeroScanX

- https://github.com/corelight/CVE-2021-41773

- https://github.com/creadpag/CVE-2021-41773-POC

- https://github.com/cyberanand1337x/apache-latest-exploit

- https://github.com/cyberanand1337x/bug-bounty-2022

- https://github.com/cyberleelawat/LeelawatX-CVE-Hunter

- https://github.com/d4n-sec/d4n-sec.github.io

- https://github.com/dai5z/LBAS

- https://github.com/danryafuz/CS564_Project

- https://github.com/dasarivarunreddy/Tryhackme-RoadMap

- https://github.com/dasarivarunreddy/free-rooms-tryhackme

- https://github.com/davincico/ChatGPT-2-HACKER

- https://github.com/dial25sd/arf-vulnerable-vm

- https://github.com/dileepdkumar/LayarKacaSiber-CVE-2021-41773

- https://github.com/dream434/cve-2021-42013-apache

- https://github.com/duggytuxy/Data-Shield_IPv4_Blocklist

- https://github.com/duggytuxy/Intelligence_IPv4_Blocklist

- https://github.com/e-hakson/OSCP

- https://github.com/edwinantony1995/Tryhackme

- https://github.com/elihsane/CyberSecurityTaak-El-Jari

- https://github.com/eljosep/OSCP-Guide

- https://github.com/enciphers-team/cve-exploits

- https://github.com/enomothem/PenTestNote

- https://github.com/exfilt/CheatSheet

- https://github.com/fardeen-ahmed/Bug-bounty-Writeups

- https://github.com/fazilbaig1/oscp

- https://github.com/fnatalucci/CVE-2021-41773-RCE

- https://github.com/freddy913/ctf-challenge

- https://github.com/g1san/Agents-for-Vulnerable-Dockers-and-related-Benchmarks

- https://github.com/gugas1nwork/apache-traversal

- https://github.com/gwill-b/apache_path_traversal

- https://github.com/gwyomarch/CVE-Collection

- https://github.com/habibiefaried/CVE-2021-41773-PoC

- https://github.com/hackedrishi/CTF_WRITEUPS-TryHackMe-CVE-2021-41773-

- https://github.com/hackgnar/setc

- https://github.com/hackingyseguridad/nmap

- https://github.com/heane404/CVE_scan

- https://github.com/hexsecteam/OSCP

- https://github.com/hktalent/TOP

- https://github.com/hktalent/bug-bounty

- https://github.com/honypot/CVE-2021-41773

- https://github.com/honypot/CVE-2021-42013

- https://github.com/htrgouvea/research

- https://github.com/htrgouvea/spellbook

- https://github.com/huimzjty/vulwiki

- https://github.com/hxysaury/saury-vulnhub

- https://github.com/i6c/MASS_CVE-2021-41773

- https://github.com/iilegacyyii/PoC-CVE-2021-41773

- https://github.com/ilurer/CVE-2021-41773-42013

- https://github.com/ilyabem/CS_TMS

- https://github.com/im-hanzou/apachrot

- https://github.com/imhunterand/ApachSAL

- https://github.com/imsalimansari/Try-Hack-Me-Roadmap

- https://github.com/imthenachoman/How-To-Secure-A-Linux-Server

- https://github.com/inbug-team/CVE-2021-41773_CVE-2021-42013

- https://github.com/iosifache/ApacheRCEEssay

- https://github.com/iosifache/iosifache

- https://github.com/ishowcybersecurity/TryHackMe-Beginner-Roadmap

- https://github.com/israelbarnabas/inpt-report

- https://github.com/itsecurityco/CVE-2021-41773

- https://github.com/j4k0m/CVE-2021-41773

- https://github.com/jaspreet-infosec/TryHackMe-Roadmap

- https://github.com/javaamo/CVE-2021-41773

- https://github.com/jbmihoub/all-poc

- https://github.com/jbovet/CVE-2021-41773

- https://github.com/jenriquezv/PEN-200-OSCP

- https://github.com/jheeree/Simple-CVE-2021-41773-checker

- https://github.com/jitmondal1/OSCP

- https://github.com/jkska23/Additive-Vulnerability-Analysis-CVE-2021-41773

- https://github.com/justakazh/mass_cve-2021-41773

- https://github.com/k46th1/Tryhackme-Roadmap

- https://github.com/k4r7h1kn/Tryhackme-Roadmap

- https://github.com/k4r7hx/Tryhackme-Roadmap

- https://github.com/kaushal2kr/network-scanner

- https://github.com/kellisfen/13-01.md

- https://github.com/kgwanjala/oscp-cheatsheet

- https://github.com/khaidtraivch/CVE-2021-41773-Apache-2.4.49-

- https://github.com/khulnasoft-lab/awesome-security

- https://github.com/khulnasoft-labs/awesome-security

- https://github.com/kirill55555/TMS_-

- https://github.com/kmukoo101/CVEye

- https://github.com/knqyf263/CVE-2021-41773

- https://github.com/komodoooo/Some-things

- https://github.com/komodoooo/some-things

- https://github.com/krazystar55/tryhackme

- https://github.com/krlabs/apache-vulnerabilities

- https://github.com/ksanchezcld/httpd-2.4.49

- https://github.com/kubota/POC-CVE-2021-41773

- https://github.com/kyutc/apachepatchy

- https://github.com/lekctut/sdb-hw-13-01

- https://github.com/leoambrus/CheckersNomisec

- https://github.com/lions2012/Penetration_Testing_POC

- https://github.com/lopqto/CVE-2021-41773_Honeypot

- https://github.com/lorddemon/CVE-2021-41773-PoC

- https://github.com/ltfafei/my_POC

- https://github.com/luck-ying/Library-POC

- https://github.com/luisdavidgarcia/WebFortress

- https://github.com/luismede/apache2.4.49-exploit

- https://github.com/lulaide/WebTree

- https://github.com/lulaide/go-poc

- https://github.com/luongchivi/CVE-2021-41773

- https://github.com/luongchivi/Preproduce-CVE-2021-41773

- https://github.com/m96dg/CVE-2021-41773-exercise

- https://github.com/m96dg/vulnerable_docker_apache_2_4_49

- https://github.com/maennis/cybersecurity-reports

- https://github.com/mah4nzfr/CVE-2021-41773

- https://github.com/mahtin/unix-v7-uucp-chkpth-bug

- https://github.com/malwaremily/infosec-news-briefs

- https://github.com/manhhungvn/dfcd2024

- https://github.com/masahiro331/CVE-2021-41773

- https://github.com/mauricelambert/CVE-2021-41773

- https://github.com/mauricelambert/CVE-2021-42013

- https://github.com/mauricelambert/mauricelambert.github.io

- https://github.com/merlinepedra/AttackWebFrameworkTools-5.0

- https://github.com/merlinepedra/RedTeam_toolkit

- https://github.com/merlinepedra25/AttackWebFrameworkTools-5.0

- https://github.com/merlinepedra25/RedTeam_toolkit

- https://github.com/mightysai1997/CVE-2021-41773-L-

- https://github.com/mightysai1997/CVE-2021-41773-PoC

- https://github.com/mightysai1997/CVE-2021-41773-i-

- https://github.com/mightysai1997/CVE-2021-41773.git1

- https://github.com/mightysai1997/CVE-2021-41773S

- https://github.com/mightysai1997/CVE-2021-41773h

- https://github.com/mightysai1997/CVE-2021-41773m

- https://github.com/mightysai1997/cve-2021-41773

- https://github.com/mightysai1997/cve-2021-41773-v-

- https://github.com/misakitanabe/mastery_extension

- https://github.com/mmguero-dev/Malcolm-PCAP

- https://github.com/mmtalsi/toolbox

- https://github.com/moffee-Puff/-Vulnerability-Scanner-using-Shodan-API

- https://github.com/mohwahyudi/cve-2021-41773

- https://github.com/morningphase/FG-CIBGC

- https://github.com/morningphase/lbas

- https://github.com/mr-exo/CVE-2021-41773

- https://github.com/muhammedshafeeque/msk

- https://github.com/n3k00n3/CVE-2021-41773

- https://github.com/nanasarpong024/tryhackme

- https://github.com/nenandjabhata/CTFs-Journey

- https://github.com/nholuongut/secure-a-linux-server

- https://github.com/nitishbadole/oscp-note-3

- https://github.com/noflowpls/CVE-2021-41773

- https://github.com/nomi-sec/PoC-in-GitHub

- https://github.com/norrig/CVE-2021-41773-exploiter

- https://github.com/not-matthias/sigflag-ctf

- https://github.com/nullenc0de/massbypass

- https://github.com/numanturle/CVE-2021-41773

- https://github.com/nwclasantha/Apache_2.4.29_Exploit

- https://github.com/ochysbliss/My-Tryhackme-

- https://github.com/odaysec/PwnTraverse

- https://github.com/olejquaa/cyb-sec-diploma

- https://github.com/omaradds1/THM

- https://github.com/orangmuda/CVE-2021-41773

- https://github.com/oscpname/OSCP_cheat

- https://github.com/pakkiraja/TryHackMe_Modules

- https://github.com/parth45/cheatsheet

- https://github.com/pedr0alencar/vlab-metasploitable2

- https://github.com/peiqiF4ck/WebFrameworkTools-5.1-main

- https://github.com/peiqiF4ck/WebFrameworkTools-5.5

- https://github.com/peiqiF4ck/WebFrameworkTools-5.5-enhance

- https://github.com/pen4uin/awesome-vulnerability-research

- https://github.com/pen4uin/vulnerability-research

- https://github.com/pen4uin/vulnerability-research-list

- https://github.com/pentestfunctions/thm-room-points

- https://github.com/petitfleur/prov_navigator

- https://github.com/pirenga/CVE-2021-41773

- https://github.com/pisut4152/Sigma-Rule-for-CVE-2021-41773-and-CVE-2021-42013-exploitation-attempt

- https://github.com/plzheheplztrying/cve_monitor

- https://github.com/provnavigator/prov_navigator

- https://github.com/psibot/apache-vulnerable

- https://github.com/puckiestyle/CVE-2021-41773

- https://github.com/pwn3z/CVE-2021-41773-Apache-RCE

- https://github.com/pwnosec/ApachSAL

- https://github.com/q99266/saury-vulnhub

- https://github.com/qwutony/CVE-2021-41773

- https://github.com/r00tVen0m/CVE-2021-41773

- https://github.com/r0otk3r/CVE-2021-41773

- https://github.com/rafifdna/CVE-2021-42013

- https://github.com/randomAnalyst/PoC-Fetcher

- https://github.com/ranggaggngntt/CVE-2021-41773

- https://github.com/ranhn/Goby-Poc

- https://github.com/ravro-ir/golang_bug_hunting

- https://github.com/redspy-sec/CVE-2021-41773

- https://github.com/reptile0bug/Tryhackme-RoadMap

- https://github.com/retr0-13/apachrot

- https://github.com/retrymp3/apache2.4.49VulnerableLabSetup

- https://github.com/revanmalang/OSCP

- https://github.com/rishabatra1802/TryHackMe_FreeRooms

- https://github.com/ritheesh0/SOC-Incident-Response-Lab

- https://github.com/rng70/TryHackMe-Roadmap

- https://github.com/rob-cobbins/AttackSurfaceLab

- https://github.com/roberta-vieira/Internal-Pentest-Project

- https://github.com/ronak4044/Cybersecurity-Task3

- https://github.com/sakshiishukla/Python-Vulnerability-Scanner

- https://github.com/samglish/ServerSide

- https://github.com/samibutt77/Examining-CVEs-Proof-of-Concepts-and-Snort-Based-Detection

- https://github.com/scarmandef/CVE-2021-41773

- https://github.com/seeu-inspace/easyg

- https://github.com/sengpakrenha/tryhackeme

- https://github.com/sergiovks/LFI-RCE-Unauthenticated-Apache-2.4.49-2.4.50

- https://github.com/shellreaper/CVE-2021-41773

- https://github.com/shengshengli/AttackWebFrameworkTools-5.0

- https://github.com/shiomiyan/CVE-2021-41773

- https://github.com/signorrayan/RedTeam_toolkit

- https://github.com/sixpacksecurity/CVE-2021-41773

- https://github.com/skentagon/CVE-2021-41773

- https://github.com/sleep33/HackN-Metal

- https://github.com/sm1lexops/delete_test

- https://github.com/soosmile/POC

- https://github.com/sparkByProxy/ssh-key-from-path-traversal

- https://github.com/speinador/Manual_Shodan

- https://github.com/sreeaswinrajha/checklist

- https://github.com/superfish9/pt

- https://github.com/superlink996/chunqiuyunjingbachang

- https://github.com/superzerosec/CVE-2021-41773

- https://github.com/superzerosec/poc-exploit-index

- https://github.com/swaptt/swapt-it

- https://github.com/tanjiti/sec_profile

- https://github.com/tejas-sonavane21/VulnScraper

- https://github.com/tharushkadinujaya05/TryHackMe-Learning-Path-From-Beginner-to-Expert

- https://github.com/the29a/CVE-2021-41773

- https://github.com/theLSA/apache-httpd-path-traversal-checker

- https://github.com/thebugbounter/TryHackMe-Roadmap

- https://github.com/thehackersbrain/CVE-2021-41773

- https://github.com/thesakibrahman/THM-Free-Room

- https://github.com/thmrevenant/tryhackme

- https://github.com/thoufeelx/blackmirror

- https://github.com/tiemio/SSH-key-and-RCE-PoC-for-CVE-2021-41773

- https://github.com/trhacknon/Pocingit

- https://github.com/twseptian/CVE-2021-41773

- https://github.com/twseptian/CVE-2021-42013-Docker-Lab

- https://github.com/twseptian/cve-2021-41773

- https://github.com/twseptian/cve-2021-41773-docker-lab

- https://github.com/twseptian/cve-2021-42013-docker-lab

- https://github.com/txuswashere/OSCP

- https://github.com/ultrew/TryHackMe-lab-index

- https://github.com/uttambodara/TryHackMeRoadmap

- https://github.com/vida00/Scanner-CVE-2021-41773

- https://github.com/vida003/Scanner-CVE-2021-41773

- https://github.com/vinhjaxt/CVE-2021-41773-exploit

- https://github.com/vinhjaxt/dfcd-2024

- https://github.com/vishal-rathod-1/shell_gpt

- https://github.com/vrbait1107/CTF_WRITEUPS

- https://github.com/vsfx1/apache_path_traversal

- https://github.com/vulf/CVE-2021-41773_42013

- https://github.com/vuongnv3389-sec/cve-2021-41773

- https://github.com/w3workerz/THM-Walkthroughs

- https://github.com/walnutsecurity/cve-2021-41773

- https://github.com/wangfly-me/Apache_Penetration_Tool

- https://github.com/waseeabaheen/mini-vulnerability-scanner

- https://github.com/weeka10/-hktalent-TOP

- https://github.com/winterwolf32/CVE-S---Penetration_Testing_POC-

- https://github.com/wolf1892/CVE-2021-41773

- https://github.com/xAKSx/TryHackMe

- https://github.com/xMohamed0/CVE-2021-41773

- https://github.com/xadyn/DIPLOMA-PROJECT

- https://github.com/xanszZZ/pocsuite3-poc

- https://github.com/xasyhack/offsec_oscp_2025

- https://github.com/xasyhack/oscp2025

- https://github.com/xasyhack/oscp_cheat_sheet_2025

- https://github.com/xhref/OSCP

- https://github.com/xuetusummer/Penetration_Testing_POC

- https://github.com/yembors64632/cve_monitor_Public

- https://github.com/yigitcantunay35/Reconx

- https://github.com/zecool/cve

- https://github.com/zer0qs/CVE-2021-41773

- https://github.com/zerodaywolf/CVE-2021-41773_42013

- https://github.com/zeronine9/CVE-2021-41773

- https://github.com/zhanpengliu-tencent/medium-cve