Is Apache HTTP vulnerable to remote code execution?

Apache HTTP version 2.4.49 does not normalize paths correctly allowing an attacker to execute arbitrary code. This TTP sends a cURL request containing the 'uname -a' command, which is executed by '/bin/sh' via Apache's 'mod_cgi'. If this matches the local box's 'uname -a' output, then the CVE was successfully exploited.
View Command

To view this TTPs command, you must be logged in with a professional or enterprise license.


Test this TTP

Download Operator (1.7.1)
Test this TTP using one of our Operator chains
Is Apache vulnerable to CVE-2021-41773?


Check if Apache HTTP is vulnerable to path traversal or remote code execution by exploiting CVE-2021-41773.