Is Apache HTTP vulnerable to remote code execution?
Apache HTTP version 2.4.49 does not normalize paths correctly allowing an attacker to execute arbitrary code. This TTP sends a cURL request containing the 'uname -a' command, which is executed by '/bin/sh' via Apache's 'mod_cgi'. If this matches the local box's 'uname -a' output, then the CVE was successfully exploited.
To view this TTPs command, you must be logged in with a professional or enterprise license.Login
Test this TTP
Download Operator (1.7.1)